News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

External attack surface management for enterprises and MSPs 

The new solution for external attack surface management brings new security to enterprises and MSP customers. The Bitdefender GravityZone EASM solution provides centralized visibility and administration of internet-connected IT assets. The advantage: proactive risk reduction and accelerated threat detection. The new GravityZone External Attack Surface Management (EASM) gives enterprises, managed service providers (MSPs), and their customers comprehensive visibility of internet-connected IT assets and identifies the associated vulnerabilities. The Bitdefender GravityZone add-on improves cybersecurity operations through centralized detection, monitoring, and…

Read more

Endpoint security combined with compliance management
Endpoint security combined with compliance management Image: depositphoto

GravityZone Compliance Manager reduces the cost and complexity of compliance across all environments and industries and integrates with endpoint security. This enables organizations to automatically generate audit-ready reports within seconds. With the GravityZone Compliance Manager, launched today by Bitdefender, organizations can significantly reduce their compliance efforts. At the same time, they are able to optimally prepare for audits with a single, comprehensive process. The new offering addresses today's complex regulatory landscape and is fully integrated with the Bitdefender Endpoint Security and Risk Analytics solution. It…

Read more

Survey: Security requirements in the procurement process
Survey: Security requirements in the procurement process - image: depositphotos

IT security has evolved from a purely technological issue to a strategic factor throughout the company – with noticeable effects on purchasing. Purchasing departments increasingly see themselves as obligated to consider security requirements in the procurement process. A recent Sophos survey of purchasing managers from various industries shows that cybersecurity is now a key criterion in the selection of products and services – and influences processes, communication, and pricing equally. Cyber ​​protection as a mandatory criterion – telecommunications at the forefront. More than 90 percent of the purchasing managers surveyed state that cybersecurity is highly relevant to their procurement decisions....

Read more

PHASR proactively strengthens endpoint security
PHASR proactively strengthens endpoint security

Bitdefender's PHASR is the industry's first endpoint security solution that dynamically hardens endpoints for each user. This ensures that security configurations are precisely tailored to the user's behavior and the privileges they require, and continuously adapt to reduce the attack surface. GravityZone PHASR reduces attack surfaces, mitigates unnecessary risks, and enforces compliance by analyzing individual user behavior, such as application usage and resource access, and dynamically restricts tools or privileges that deviate from established normal behavior. Proactive approach to threat management: GravityZone…

Read more

SaaS for security assessment of Active Directory and Entra ID
SaaS for security assessment of Active Directory and Entra ID Image: Bing - AI

A new SaaS solution is able to provide a security assessment for Active Directory and Entra ID environments. The online assessment of the security situation for hybrid AD environments provides comprehensive insight into security gaps and reduces the risk of cyber attacks for small and medium-sized companies up to extremely complex identity environments. Lightning Intelligence is a new, easy-to-implement offering on the Lightning Platform for assessing the security situation in multi-forest Active Directory and multi-tenant Entra ID environments. In addition, security trend reports are provided, saving time. The risk of identity-related attacks, which account for 90 percent of...

Read more

Oracle releases 318 security updates in January
B2B Cyber ​​Security ShortNews

The list of 318 security updates does not immediately show the risk ratings with CVSS values, but a look at the descriptions quickly shows that the package contains a large number of critical updates with ratings between 9.0 and 10, as well as many highly dangerous vulnerabilities. The Oracle Critical Patch Update from January 2025 contains 318 security updates for numerous products. A risk matrix shows the affected components and CVSS scores for risk assessment. Workarounds offer temporary protection measures if direct patching is not possible. Oracle emphasizes the importance of prompt updates, as attacks on known vulnerabilities continue to be observed...

Read more

Cybersecurity is an illusion
Cybersecurity is an illusion

Everyone from interns to CEOs has heard the long-worn phrase "There is no such thing as 100% cybersecurity". But as with many universally accepted sayings, the crucial question here is: what follows from this? In the context of cybersecurity, the answer should be: a rethink. Absolute security is not only unattainable, it is also unnecessary. The variety of sources of error alone makes it clear that systems can never be fully protected - from zero-day exploits, the exploitation of an as yet undetected vulnerability, and undocumented maintenance access to new attack methods and even human...

Read more

Survey: Platform for network, AI and security desired
Survey: Platform for network, AI and security desired Image: Bing - AI

A survey of 200 CIOs and IT professionals shows that the majority of respondents want a central, integrated platform for networking, AI and security to increase productivity, optimize investments and protect against increasing cyber threats. The new study, entitled CIO Insights Report: Priorities and Investment Plans in the Era of Platformization, was recently published by Extreme Networks. The results show that while AI has caught the attention of the technology industry, the majority of CIOs and IT leaders are in…

Read more

Dangerous gaps: Study on ICS and OT cybersecurity
Dangerous gaps: Study on ICS and OT cybersecurity - Image by GrumpyBeere on Pixabay

The SANS Institute has released the results of its 2024 State of ICS/OT Cybersecurity study. It shows significant progress in securing industrial control systems (ICS) and operational technologies (OT). However, the report also warns that many companies are still leaving critical systems unprotected. Companies that use both ICS/OT cybersecurity standards and threat intelligence to guide their program are ahead of their competitors in terms of maturity and capabilities. Such companies detect cyber events faster, are more likely to have mapped out all external connections to the industrial environment, and typically have ICS/OT-specific…

Read more

NIS2 and the security obligation: email encryption
NIS2 and the security obligation: Email encryption Image: Bing - AI

Although email encryption is not explicitly mentioned as a separate topic in the NIS2 Directive, it falls under the general requirements for securing communication systems and protecting sensitive data. Companies must therefore ensure that their communication channels, including email, are sufficiently secured. The NIS2 Directive must be implemented into national law by member states by October 17.10.2024, XNUMX. Its introduction is intended to strengthen measures against cyber threats and create a uniform European legal framework for the EU-wide development of national IT security capacities as well as minimum security requirements and reporting obligations for certain services. The aim is to create uniform measures...

Read more