News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Secure ID card app2
Secure ID card app2 there

The Ausweisapp2 promises a revolution, but it also makes the highest demands on data protection. It is nothing less than a quantum leap that the digital ID card app2 - an ambitious and at the same time overdue federal project - promises. The app has been available for some time, but so far too few citizens have taken notice of its existence, let alone used its functions. Ausweisapp2 for identification on the Internet We in Germany had to wait far too long for a practical solution for identification on the Internet to be delivered ...

Read more

IoT search engines: curse or blessing?
Eset_News

Are IoT search engines like Shodan or Censys a blessing or a curse? An ESET security expert takes a critical look at Shodan and Censys. Shodan and Censys are search engines for the Internet of Things (IoT). With these portals, devices and systems can be permanently connected to the Internet. These include, for example, surveillance cameras, webcams, servers, PCs, smart home systems, industrial controls or various network components. Both services see themselves as helpers to improve IT security. Security solutions for companies and private users, however, recognize these queries as potential attacks. In his current article "Shodan and Censys - Friend or ...

Read more

Web applications vulnerable to cyber attacks
Web applications are susceptible to cyber attacks

A Radware study shows: Web applications are unnecessarily vulnerable to cyber attacks. Global enterprises struggle to maintain consistent application security across multiple platforms. They also lose transparency with the emergence of new architectures and the introduction of Application Program Interfaces (APIs). These are the key findings of Radware's 2020-2021 State of Web Application Security Report study. The background to this development is the need to quickly adapt to a new model for remote work and customer contact that resulted from the pandemic. In this transition, many decision makers have had little or no time for proper security planning….

Read more

Study: Public Administration in Times of Crisis
B2B Cyber ​​Security ShortNews

The corona pandemic is changing everyday work in public administration to an unprecedented extent. A study at Next: Public sponsored by well-known manufacturers provides information. The study Administration in Times of Crisis - An inventory of the effects of the corona pandemic on the public service examines in detail what experiences employees of authorities have had in their new everyday work. What is special: In a parallel survey, citizens also assessed the work of the administration in the Corona crisis. A central finding of the study: From the point of view of the employees, German administrations also function in a crisis. The majority…

Read more

Business and security officials are at odds
Meeting communication security officers

A study reveals a lack of cooperation between German business and security officers, which has negative effects. The gap is also evident in how companies respond to the global pandemic. Tenable, the cyber exposure company, identified a lack of collaboration between German business and security officials, which has proven to be detrimental to businesses, according to a new industry report. Sixty-six percent of German security officers said they did not work with business stakeholders to align cost, performance, and risk mitigation goals with the company's needs and priorities. So stated 45 ...

Read more

Configuration error: easy game for hackers
Network security configuration error hackers

Even if cyber criminals and hackers use increasingly sophisticated attack techniques to break into company networks, security breaches can often be traced back to avoidable, often overlooked misconfigurations. In order not to open the door to hackers to sensitive data and IT environments, here are the five most common configuration errors that companies should avoid. 1. Standard credentials Unconfigured standard user names and passwords for devices, databases, and installations are comparable to leaving the key in a locked door. Even hobby hackers can cause extensive damage to a company with the help of freely available tools. Standard login data on network devices such as ...

Read more

Danger: home office & emails
Email company marketing

In times of home office in particular, emails as corporate communication are always a cyber threat. Here is an overview of the five worst mistakes in email communication. In view of the increasing number of corona cases, a “second wave” in autumn is a likely scenario. It is still unclear what containment measures will be taken this time. The first lockdown phase showed that efficient communication with and between employees is a decisive success factor for companies. If it takes place via e-mail, it is often slowed down by errors that can be easily avoided. We have compiled the most important ones for you here. 1….

Read more

Mobile SDK for secure in-app support
B2B Cyber ​​Security ShortNews

TeamViewer introduces its new Mobile SDK for secure in-app support. New white label solution for professional, GDPR-compliant support via remote access extends the enterprise offering. TeamViewer, a leading global provider of secure remote connectivity solutions, today announced the TeamViewer Mobile Software Development Kit (SDK) as part of the Tensor enterprise platform offering. With the new product, companies can integrate the remote support functions of TeamViewer as a white label solution in their own mobile apps and at the same time meet GDPR requirements. If an app does not work properly, it is very annoying for the user. One way for quick support in the application is ...

Read more

Cyber ​​security on the world's oceans
News B2B Cyber ​​Security

IT baseline protection profiles of the BSI become part of the national recommendation for International Safety Management (ISM) code and thus ensure more cyber security on the world's oceans. From 2021, new specifications for cyber security on board ships will apply in the maritime sector. With resolution MSC.428 (98) of the International Maritime Organization (IMO), shipping companies are required to protect themselves from cyber risks from 2021. For this purpose, the existing International Safety Management (ISM) code is used, an international set of rules that stipulate binding measures for the organization of safe ship operation. To integrate cyber security, as part of the national implementation in ...

Read more

Secure data exchange in the cloud - idgard
Cloud Computing

The topic of home office has taken on a new dimension due to the current pandemic. Many employees are still working at least partially from home and will do so in the foreseeable future. With the rapid increase in remote work, the number of attack vectors is increasing at the same time - after all, cyber criminals are also taking advantage of the current situation. Companies must therefore provide their employees with user-friendly and secure options for working from home. Especially in times like this, the topic of "secure, flexible data exchange" is gaining in importance. The operator-secure cloud idgard®, the business cloud from TÜV SÜD subsidiary uniscon, offers ...

Read more