News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Good security and data protection functions drive 5G networks
Good security and data protection functions drive 5G networks

A new study by Trend Micro, one of the world's leading providers of cyber security solutions, shows that improved security and data protection functions are the main motive for the expansion of private 5G networks. The disclosure of data transmitted over the wireless network is considered the greatest security concern. More and more operators of networked production plants, hospitals or other "smart" infrastructures are looking for alternatives to public 5G networks and hope for better coverage and control, low latency times and a higher level of security through private 5G networks. However, such environments have a number of security requirements that traditional…

Read more

Even after Corona: Digital payments continue to increase
B2B Cyber ​​Security ShortNews

Germans see digital payments as secure, and they are easier and faster than cash. The corona boost in digital payment methods is thus continuing. The Postbank Digital Study 2022 shows which groups have the most trust. Digital payment continues to increase: Six out of ten Germans already pay contactless with their smartphone or a card. In 2021 it was still 56 percent, in 2020 just before the pandemic only 47 percent. The Corona crisis has clearly driven the trend: 30 percent of mobile payment users state that they handle less cash because of the pandemic.

Read more

Challenges of a data-centric IT security strategy
Challenges of a data-centric IT security strategy

According to a study by the IT industry association Bitkom, spending on IT security is currently at an all-time high. Revenue growth of 2022 percent is expected for 9,9 and average annual growth of 2025 percent until 5,9. A development that was driven by the need to work in home offices due to the pandemic. Increasing cybercrime, the use of cloud computing, the rapid spread of mobile devices and the different technologies and applications are forcing companies to protect themselves against more and more IT risks. However, the effectiveness of these measures is increasingly measured by the extent to which they can guarantee the security of company data without gaps. risen…

Read more

Kaspersky successfully receives SOC 2 certification again
Kaspersky successfully receives SOC 2 certification again

Kaspersky remains committed to the highest security principles and has again developed the Service Organization Control for Service Organizations (SOC 2) Type 1 Audit Service Organization Controls (SOC) Reporting Framework is a globally recognized report that confirms that an organization's security controls are in line with the 'Trust Services Criteria' (TSC) of the AICPA. The main criteria here are safety,…

Read more

SASE network: connecting security and the cloud

A centralized approach in the cloud has as many limitations as an on-premises data center. But you can also connect a SASE network, security and the cloud. A comment from Stefan Schachinger, Product Manager Network Security - IoT/OT/ICS at Barracuda. The much-cited prophecy that life punishes those who come late seems to find its truth in IT network security as well. At the beginning of the pandemic, many companies were forced to switch from office work to home office - often with incomplete security regarding the IT infrastructure. A feast for hackers! Now remote work is not really something new;…

Read more

Every second employee wants more IT security in the company
G Data News

G DATA study shows: Employees must become an elementary part of a holistic IT security concept. IT security should have a higher priority in companies. That is the opinion of almost 75 percent of the people with a higher level of IT security expertise who were surveyed for the current survey "Cybersecurity in Figures" by G DATA CyberDefense in cooperation with Statista. "Security on the Internet" plays a central role in Germany - both privately and professionally. This is confirmed by a current survey by G DATA CyberDefense in cooperation with Statista. However, the study “Cybersecurity in…

Read more

Log4j vulnerability in ASCEND closed quickly
B2B Cyber ​​Security ShortNews

The Log4j vulnerability in December 2021 caused a major stir in cybersecurity. ASCEND reacted immediately and examined and secured all hardware and software systems - also for customers. In December 2021, a vulnerability rated as extremely critical was discovered in the widely used Java library Log4j. It allows cyber criminals to easily access a targeted server to run malware or take control of the system. ASCEND reacted immediately and checked all systems for this gap. Patches have closed Log4j gaps "Our hardware manufacturers and software partners have the few...

Read more

Container security also offers attack surfaces
Container security also offers attack surfaces

Risk awareness, classic cyber security principles and specific countermeasures increase the security of data and processes. IT managers use their own container security or those provided by cloud service providers in order to set up agile and flexible applications and operate processes. Ultimately, however, containers are also executable applications and can be dangerous. Container host servers and registries extend the attack surface. Classic principles of IT security and an increased sensitivity to threats help to close emerging gaps. Containers in the cloud or on-premise containers - whether kept privately or provided via a cloud provider - offer hackers ...

Read more