News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Indispensable: patch automation for endpoints
Essential: Patch automation for endpoints

Patching endpoints is one of the most important, but also one of the most time-consuming activities of IT departments. Automation solutions reduce the effort considerably, but not every tool delivers what it promises. Five features that provide real relief. Patching often feels like Sisyphean work for IT departments, especially updating third-party applications. There are usually a few dozen of these in the company, which causes a veritable flood of patches. Each one has to be tested on different systems and then gradually rolled out to thousands of computers - without patch automation, that's...

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Splunk rolls out 12 security patches - 9 are 'High'
B2B Cyber ​​Security ShortNews

Manufacturer Splunk has to fill a lot of gaps with security patches in its planned 3-month updates. Of the 12 updates listed, Splunk 9 rates itself as Highly Dangerous. In addition, there are 2 third-party updates that are also classified as Highly Dangerous. The list of security patches for Splunk Enterprise products is long. In addition to the vulnerabilities published months ago, there are another 12 vulnerabilities and an additional 2 vulnerabilities from third parties in the planned, quarterly patch list. Right now, administrators and CISOs should pay attention to the published list that 9 of the 12 vulnerabilities are...

Read more

Teams: When employees divulge sensitive data
Teams: When employees divulge sensitive data

Most backup and security vendors overlook teams as an important communication channel. Employees often pass on business-critical information that also affects security. Wrong listeners can skim off information in this way. Hornetsecurity urgently points out that many companies need better protection for Microsoft Teams data. A commissioned study highlights the often-overlooked need for Teams backup and security. The survey revealed that almost half of the users (45%) often send confidential and critical information via the platform. Internal corporate communication via chat has...

Read more

Greater awareness of IT security due to the Ukraine conflict
Greater awareness of IT security due to the Ukraine conflict

As a G DATA study shows, the conflict in Ukraine has led to a higher awareness of IT security: 37 percent of Germans pay more attention to IT security in the company, even as employees. More than 5.000 employees in Germany were surveyed for the mood picture. Crises like the Ukraine war influence the mood in Germany. As a result, people feel less safe. This is also reflected in the current study "Cyber ​​Security in Numbers", which G DATA CyberDefense conducted together with Statista. More than a third of those surveyed are more attentive to the topic of IT security than...

Read more

Ransomware: proactive protection in the cloud 
Ransomware: proactive protection in the cloud

The Orca Security and AWS guide outlines five key steps organizations can take to better protect against ransomware in the cloud. Businesses should use AWS Backup to create immutable backups of their most important cloud resources and run regular tests. Ransomware attacks are now also affecting cloud resources. However, the therefore indispensable ransomware prevention in the cloud is not only to detect malware, but also to continuously secure and harden the cloud environment. The aim is to prevent attackers from being able to reach their goal. Organizations must also ensure they use AWS Backup to...

Read more

Report: Growing threats from unencrypted devices
Report: Growing threats from unencrypted devices

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment. A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident. 16 percent unencrypted devices When an unencrypted device is connected to a corporate network in an office environment, the risk of a security incident is reduced. In the world of…

Read more

SaaS portfolio with ISO certification
B2B Cyber ​​Security ShortNews

CyberRes, a division of Micro Focus, announces that its software-as-a-service (SaaS) cyber resilience products have received ISO 27001.2013 certification in the Information Security Management System (ISMS) category. With the certification of the International Organization for Standardization (ISO), one of the best-known standardization bodies in the industry, CyberRes achieves an important milestone: It officially confirms that the company develops, secures and operates its SaaS products both with the help of best practices and with consideration of customer data protection implemented, maintained and continuously improved. ISO 27001 certification is the gold standard “Obtaining ISO 27001 certification is another…

Read more

Tight budgets slow down IT security strategy
Tight budgets slow down IT decision-makers

Report: Tight budgets and a lack of executive support are causing critical security controls to fall by the wayside. 60 percent of IT decision-makers are being prevented from implementing an adequate IT security strategy More than half of IT security decision-makers (60%) are of the opinion that their IT security strategy is not keeping pace with the current threat situation Survey* by Delinea, the specialist in privileged access management (PAM) solutions for seamless security, shows. For example, 20 percent of the security professionals surveyed think they are lagging behind in their security practices, 13 percent believe they are standing still, and only 27 percent are trying…

Read more

Report on the state of IIoT and OT security
Report on the state of IIoT and OT security

Network and cloud security specialist Barracuda publishes its report on the state of IIoT and OT security "The State of Industrial Security in 2022". Manufacturing and health care bring up the rear when it comes to completed security projects. 800 IIoT/OT managers answered the survey. Cloud security specialist Barracuda surveyed 800 senior IIoT/OT managers worldwide about their experiences and views regarding IIOT/OT security in their companies. Barracuda presents the findings on IIoT/OT security projects, implementation challenges, security incidents and technology investments as well as topics related to cyber security risks with the current report The State of Industrial Security in 2022. KRITIS increasingly as a target of attack Critical infrastructures are increasingly being targeted by…

Read more