News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Contract hacker: hunter of data treasure
Contract hacker: hunter of data treasure

Cybercriminals focus on companies: As digitization progresses, the volume of data in the economy will multiply in the future. These are particularly tempting targets for hackers or blackmailers. The legislation has therefore ensured that data protection also enjoys a high priority in digital data processing. In addition to protecting trade secrets, companies must give high priority to the security of personal data. Violations of the GDPR can have particularly serious consequences: If there is a loss of data, those affected must be informed. In addition, such a security incident can be reported by the supervisory authorities with a ...

Read more

Now we start with 5G and the security priorities 
F5 news

Around half of the mobile network operators are already installing their own 5G network or are planning to do so in concrete terms and are also setting security priorities. This is shown by a worldwide IDG survey of service providers on behalf of F5. Currently, almost no provider has a dedicated 5G core network. Such standalone networks are likely to spring up like mushrooms: 18 percent of the network operators surveyed installed a 2020G standalone core at the end of 5, and a further 29 percent want to follow soon. Of the European participants, 21 percent are working on a 5G standalone core, and a further 21 percent are in the planning phase. Europe is not far behind Asia, ...

Read more

Does Windows 11 make a PC more secure?
B2B Cyber ​​Security ShortNews

AV-Comparatives looked at how Windows 11 affects the security of the average PC. A blog post by David Weston, Director of Enterprise and OS Security at Microsoft, details the security hardware requirements in Windows 11. One of the most controversial aspects of the new version of Windows is the hardware requirements. In addition to more memory (RAM) and hard disk space, the release version of Windows 11 requires certain hardware-based security functions that must be available on the PC. This includes a TPM (Trusted Platform Module) chip version 2.0 and a processor with VBS (virtualization-based security) and HVCI ...

Read more

How secure is macOS from Apple?
Eset_News

Zero trust security: how secure is macOS from Apple? ESET researchers scrutinize well-known Mac myths, such as system immunity to malware and the allegedly few security flaws. Almost every day the media report on ever larger, constantly improved and highly successful hacker attacks on companies worldwide. That is why many company leaders are already rethinking their security strategy and are turning more and more to "Zero Trust Security". This also includes checking the operating systems used, such as macOS, more precisely for their security. Because there are many myths about the security of Apple's macOS: starting with the complete immunity to ...

Read more

Cloud security with MITER ATT & CK for Containers
Cloud security with MITER ATT & CK for Containers

Shaping the future of cloud security with MITER ATT & CK for Containers. Trend Micro is contributing to a new framework that helps companies build and deploy secure container environments. Trend Micro, one of the world's leading providers of cloud security, is supporting MITER with research and resources in developing a new framework for container security. Trend Micro threat intelligence was an integral part of the development of ATT & CK® for Containers. MITER benefited from the evidence-based results from several years of dedicated research with which Trend Micro supported the new framework. Evidence-based results from the research "Trend Micro ...

Read more

Kaspersky Industrial Cyber ​​Security for Networks
Kaspersky Industrial Cyber ​​Security for Networks

Kaspersky Industrial CyberSecurity for Networks: Cyber ​​security expert presents new functionalities such as intelligent vulnerability management with recommendations for eliminating potential attack points, automated learning functions for monitoring data traffic and much more. Kaspersky introduces the new version of its platform for the visibility and security of industrial networks: Kaspersky Industrial CyberSecurity for Networks. From now on, this not only monitors the data traffic in the operating technology (OT) and detects unauthorized activities, but also indicates weak points in devices and gives recommendations for their elimination. The additional support of the BACnet protocol enables intelligent building systems to be effectively ...

Read more

Untrained employees increase IT risk 
Untrained employees increase IT risk

Untrained employees repeatedly put IT security to the test in German medium-sized companies. A G DATA survey sheds light on the problems and shows how effective security awareness is. Every second company in German medium-sized companies knows the situation if a cyber attack was successful. Untrained employees often play an important role in this. E-mails are the number one attack route in IT systems because employees can quickly fall for fake invoices or applications. A current survey by G DATA CyberDefense shows the pitfalls in security awareness. Employees are not IT security specialists IT security is for most employees ...

Read more

Study: AI is the most important success factor 
B2B Cyber ​​Security ShortNews

AI is the most important success factor - say more than 80 percent of financial institutions in an NTT DATA study. But: Only 16 percent use AI and data for personalized customer recommendations - where does this discrepancy come from? According to a study by NTT DATA, the majority of executives in the financial services sector agree: the implementation of Artificial Intelligence (AI) will be the decisive factor for competitiveness in the next few years. In fact, 83 percent of respondents agree that AI and access to specific data sets create new opportunities to differentiate offers and acquire customers….

Read more

F5 improves security of apps and APIs
F5 improves security of apps and APIs

F5 improves the security of apps and APIs for modern digital offerings. The new SaaS products ensure the security of applications: Device ID and Shape Recognize use unique data and analysis functions that eliminate login problems and at the same time protect against fraud. The new offers also strengthen the technological leadership position of F5. The company combines multi-cloud security and deployment for applications with protection technologies against bots and fraud. This protects companies and people from current threats. APIs are always a target for hackers "APIs play an essential role in the reach of digital offerings for companies every ...

Read more

BSI: Measures for the safe use of AI
B2B Cyber ​​Security ShortNews

BSI shows measures for the safe use of AI: Safe, robust and traceable use of AI problems, measures and need for action. Artificial intelligence (AI) is increasingly finding its way into everyday life. This also applies to potentially critical areas of application such as (partially) autonomous driving, face recognition or the evaluation of medical data. However, the good performance of the AI ​​methods is also offset by problems that have not yet been resolved. Clear action paper on the use of AI In an overview document, the Federal Office for Information Security (BSI) shows problems, measures and need for action for a safe, robust and traceable use of AI. Eight pages provide developers and ...

Read more