News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

SaaS for security assessment of Active Directory and Entra ID
SaaS for security assessment of Active Directory and Entra ID Image: Bing - AI

A new SaaS solution is able to provide a security assessment for Active Directory and Entra ID environments. The online assessment of the security situation for hybrid AD environments provides comprehensive insight into security gaps and reduces the risk of cyber attacks for small and medium-sized companies up to extremely complex identity environments. Lightning Intelligence is a new, easy-to-implement offering on the Lightning Platform for assessing the security situation in multi-forest Active Directory and multi-tenant Entra ID environments. In addition, security trend reports are provided, saving time. The risk of identity-related attacks, which account for 90 percent of...

Read more

Oracle releases 318 security updates in January
B2B Cyber ​​Security ShortNews

The list of 318 security updates does not immediately show the risk ratings with CVSS values, but a look at the descriptions quickly shows that the package contains a large number of critical updates with ratings between 9.0 and 10, as well as many highly dangerous vulnerabilities. The Oracle Critical Patch Update from January 2025 contains 318 security updates for numerous products. A risk matrix shows the affected components and CVSS scores for risk assessment. Workarounds offer temporary protection measures if direct patching is not possible. Oracle emphasizes the importance of prompt updates, as attacks on known vulnerabilities continue to be observed...

Read more

Cybersecurity is an illusion
Cybersecurity is an illusion

Everyone from interns to CEOs has heard the long-worn phrase "There is no such thing as 100% cybersecurity". But as with many universally accepted sayings, the crucial question here is: what follows from this? In the context of cybersecurity, the answer should be: a rethink. Absolute security is not only unattainable, it is also unnecessary. The variety of sources of error alone makes it clear that systems can never be fully protected - from zero-day exploits, the exploitation of an as yet undetected vulnerability, and undocumented maintenance access to new attack methods and even human...

Read more

Survey: Platform for network, AI and security desired
Survey: Platform for network, AI and security desired Image: Bing - AI

A survey of 200 CIOs and IT professionals shows that the majority of respondents want a central, integrated platform for networking, AI and security to increase productivity, optimize investments and protect against increasing cyber threats. The new study, entitled CIO Insights Report: Priorities and Investment Plans in the Era of Platformization, was recently published by Extreme Networks. The results show that while AI has caught the attention of the technology industry, the majority of CIOs and IT leaders are in…

Read more

Dangerous gaps: Study on ICS and OT cybersecurity
Dangerous gaps: Study on ICS and OT cybersecurity - Image by GrumpyBeere on Pixabay

The SANS Institute has released the results of its 2024 State of ICS/OT Cybersecurity study. It shows significant progress in securing industrial control systems (ICS) and operational technologies (OT). However, the report also warns that many companies are still leaving critical systems unprotected. Companies that use both ICS/OT cybersecurity standards and threat intelligence to guide their program are ahead of their competitors in terms of maturity and capabilities. Such companies detect cyber events faster, are more likely to have mapped out all external connections to the industrial environment, and typically have ICS/OT-specific…

Read more

NIS2 and the security obligation: email encryption
NIS2 and the security obligation: Email encryption Image: Bing - AI

Although email encryption is not explicitly mentioned as a separate topic in the NIS2 Directive, it falls under the general requirements for securing communication systems and protecting sensitive data. Companies must therefore ensure that their communication channels, including email, are sufficiently secured. The NIS2 Directive must be implemented into national law by member states by October 17.10.2024, XNUMX. Its introduction is intended to strengthen measures against cyber threats and create a uniform European legal framework for the EU-wide development of national IT security capacities as well as minimum security requirements and reporting obligations for certain services. The aim is to create uniform measures...

Read more

DA-CH: Are employees a danger from within?
DA-CH: Are employees a danger from within? Image by StartupStockPhotos on Pixabay

Are angry and careless employees a security problem for companies? Austrian managers place the greatest trust in their employees, Germany is generally confident and Switzerland is more cautious. Publications repeatedly address the great threat to cyber security posed by employees. In particular, disgruntled, bribed or angry former employees who have stolen data are the focus of attention. Human error is also regularly identified as another crucial and dangerous factor for cyber security. It can lead to serious security incidents that are caused by carelessness within the workforce...

Read more

Risk of VPN attacks: every second company affected
Risk of VPN attacks: every second company affected Image: Bing - AI

The VPN Risk Report shows that more than half of companies were affected by cyberattacks via VPN in 2023. According to the Zscaler ThreatLabz Report 2024, 78 percent of companies plan to implement a Zero Trust strategy in the next 12 months. ThreatLabz VPN Risk Reports 2024: As part of this study, Cybersecurity Insiders surveyed over 600 IT security, IT and networking professionals. 56 percent of participating companies said they had been the target of cyberattacks in the past year that exploited security vulnerabilities in VPNs. These incidents underscore the vulnerability of traditional perimeter-based…

Read more

IT security decision-makers see AI as a threat

In a new study, 1.200 IT security decision-makers worldwide were asked about their biggest security concerns. Concerns about AI were mentioned in first place. But the increase in data breaches in Germany is also a major concern. Bitdefender has presented its 1 Cybersecurity Assessment Report. For the study, the independent market researchers at Censuswide asked professional security managers about their concerns, approaches and key challenges facing companies. The most striking results are the high fear of artificial intelligence, an increase in data breaches in Germany of 2024% compared to 12,7 and a...

Read more

Advanced Unified Endpoint Management (UEM) solution
Advanced Unified Endpoint Management (UEM) solution - Image by svetjekolem on Pixabay

The Unified Endpoint Management (UEM) solution from baramundi has received numerous enhancements. These include password management options, secure connections through Per-App VPN and further development for recording end user feedback in Argus Experience. With this release, Argus Experience now has the functionality to record end user feedback directly. In addition to other new device data, IT admins also have the option of continuously requesting direct feedback from employees about their IT environment. This provides a holistic view of the managed work environments and IT admins can proactively and specifically identify and resolve potential incidents before a ticket is opened. Per-App VPN…

Read more