News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New SaaS-based security solution
New SaaS-based security solution

The F5 Distributed Cloud App Infrastructure Protection (AIP) solution extends application observability and protection to cloud-native infrastructures. Built on the technology acquired with Threat Stack, AIP complements the F5 Distributed Cloud Services portfolio of cloud-native, SaaS-based services for application security and delivery. Companies of all sizes and industries are currently looking to simplify, secure and modernize application-based digital experiences. But many face the challenge of managing distributed and hybrid application infrastructures with workloads spread across on-premises, public cloud, and edge locations. This leads to enormous complexity and increases…

Read more

2022: Hackers discover over 65.000 software vulnerabilities
2022: Hackers discover over 65.000 software vulnerabilities

New Hacker-Powered Security Report from HackerOne: Digital transformation and cloud migration are fueling the rise in security vulnerabilities. Ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. HackerOne, the security platform for Attack Resistance Management, today released its 2022 Hacker-Powered Security Report. The report shows that the HackerOne community of ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. 65.000 vulnerabilities fewer reports of vulnerabilities emerging during digital transformation projects recorded…

Read more

Indispensable: patch automation for endpoints
Essential: Patch automation for endpoints

Patching endpoints is one of the most important, but also one of the most time-consuming activities of IT departments. Automation solutions reduce the effort considerably, but not every tool delivers what it promises. Five features that provide real relief. Patching often feels like Sisyphean work for IT departments, especially updating third-party applications. There are usually a few dozen of these in the company, which causes a veritable flood of patches. Each one has to be tested on different systems and then gradually rolled out to thousands of computers - without patch automation, that's...

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Splunk rolls out 12 security patches - 9 are 'High'
B2B Cyber ​​Security ShortNews

Manufacturer Splunk has to fill a lot of gaps with security patches in its planned 3-month updates. Of the 12 updates listed, Splunk 9 rates itself as Highly Dangerous. In addition, there are 2 third-party updates that are also classified as Highly Dangerous. The list of security patches for Splunk Enterprise products is long. In addition to the vulnerabilities published months ago, there are another 12 vulnerabilities and an additional 2 vulnerabilities from third parties in the planned, quarterly patch list. Right now, administrators and CISOs should pay attention to the published list that 9 of the 12 vulnerabilities are...

Read more

Teams: When employees divulge sensitive data
Teams: When employees divulge sensitive data

Most backup and security vendors overlook teams as an important communication channel. Employees often pass on business-critical information that also affects security. Wrong listeners can skim off information in this way. Hornetsecurity urgently points out that many companies need better protection for Microsoft Teams data. A commissioned study highlights the often-overlooked need for Teams backup and security. The survey revealed that almost half of the users (45%) often send confidential and critical information via the platform. Internal corporate communication via chat has...

Read more

Greater awareness of IT security due to the Ukraine conflict
Greater awareness of IT security due to the Ukraine conflict

As a G DATA study shows, the conflict in Ukraine has led to a higher awareness of IT security: 37 percent of Germans pay more attention to IT security in the company, even as employees. More than 5.000 employees in Germany were surveyed for the mood picture. Crises like the Ukraine war influence the mood in Germany. As a result, people feel less safe. This is also reflected in the current study "Cyber ​​Security in Numbers", which G DATA CyberDefense conducted together with Statista. More than a third of those surveyed are more attentive to the topic of IT security than...

Read more

Ransomware: proactive protection in the cloud 
Ransomware: proactive protection in the cloud

The Orca Security and AWS guide outlines five key steps organizations can take to better protect against ransomware in the cloud. Businesses should use AWS Backup to create immutable backups of their most important cloud resources and run regular tests. Ransomware attacks are now also affecting cloud resources. However, the therefore indispensable ransomware prevention in the cloud is not only to detect malware, but also to continuously secure and harden the cloud environment. The aim is to prevent attackers from being able to reach their goal. Organizations must also ensure they use AWS Backup to...

Read more

Report: Growing threats from unencrypted devices
Report: Growing threats from unencrypted devices

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment. A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident. 16 percent unencrypted devices When an unencrypted device is connected to a corporate network in an office environment, the risk of a security incident is reduced. In the world of…

Read more

SaaS portfolio with ISO certification
B2B Cyber ​​Security ShortNews

CyberRes, a division of Micro Focus, announces that its software-as-a-service (SaaS) cyber resilience products have received ISO 27001.2013 certification in the Information Security Management System (ISMS) category. With the certification of the International Organization for Standardization (ISO), one of the best-known standardization bodies in the industry, CyberRes achieves an important milestone: It officially confirms that the company develops, secures and operates its SaaS products both with the help of best practices and with consideration of customer data protection implemented, maintained and continuously improved. ISO 27001 certification is the gold standard “Obtaining ISO 27001 certification is another…

Read more