News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Five levels for the highest security
Five pillars for the highest level of security

Companies large and small are facing an increasing number of cyberattacks, while at the same time the amount of sensitive data is increasing. Going without a Security Operations Center (SOC) is like playing with fire - because the next attack is sure to come. Ontinue, an expert in Managed Extended Detection and Response (MXDR), has put together a complete solution for the cybersecurity game. If “cybersecurity” were a PC or console game, it would probably be a so-called cooperation strategy game: In order to successfully defend themselves against hackers, companies need a strong basis (security infrastructure) and excellent teamwork. Co-op games have similar requirements for...

Read more

XDR Innovation: Respond faster to advanced threats 
XDR Innovation: Respond faster to advanced threats

Cisco Extended Detection and Response (XDR) aims to accelerate and simplify security processes in cross-manufacturer, hybrid environments. Evidence-based automation prioritizes and remediates security incidents. Cisco XDR is a complete in-house development and will be generally available in July 2023. The solution simplifies incident investigation across the IT ecosystem and enables Security Operations Centers (SOCs) to immediately mitigate threats. The cloud-first solution uses AI-supported, analytical methods to accelerate the evaluation of incidents and responses to them. So the focus shifts from intricate investigations of everything going on to fixing the incidents…

Read more

Google Cloud: Data analysis to identify attack patterns
Google Cloud: Data analysis to identify attack patterns

NTT DATA partners with Google Cloud for more cyber security. Organizations can privately retain, analyze, and search logs from security and network components, and applications that generate them, to identify attack patterns and trigger automated responses. This collaboration concerns the Chronicle Security Operations Suite with Chronicle SIEM (Security Information and Event Management) as well as Chronicle SOAR (Security Orchestration, Automation and Response) and VirusTotal, which is built and developed as a specialized layer on top of the core infrastructure of Google Cloud. Data analysis can detect attacks NTT DATA also offers this as a Managed Security Service Provider (MSSP)...

Read more

Centralized platform for threat intelligence management
Centralized platform for threat intelligence management

To support security and response teams in companies in the detection, investigation and combating of threats and to increase the efficiency of IT security processes, Kaspersky has turned its threat intelligence fusion and analysis tool, Kaspersky CyberTrace, into a central threat intelligence -Platform expanded. The Kaspersky CyberTrace solution now includes enhanced threat intelligence platform functions. This includes, among other things, an alert triage, the analysis of threat data and the investigation of incidents. The paid version can be integrated with all common SIEM (Security Information and Event Management) solutions and security controls and offers a graphic visualization for an efficient reaction. The community version of ...

Read more

Log management: audit security in just four steps

Log management is rarely a solution, but mostly a constant task. This is a major challenge, especially for small and medium-sized companies. The intelligent ProLog solution from ProLog AG enables data protection-compliant log management made in Germany. If you want to protect yourself against cyber attacks, espionage and digital data theft, or if you are a public authority / KRITIS company you need to protect yourself, you cannot avoid secure log management. With ProLog from manufacturer ProLog AG, IT security expert and value-added distributor ProSoft now provides a simple solution for secure log management via certified resellers. On the basis of integrated functions such as ...

Read more

Exabeam improves security analytics in the cloud
Exabeam improves security analytics in the cloud

Exabeam improves security analytics in the cloud with Fusion XDR and Fusion SIEM. New Fusion security solutions automate 100 percent of the TDIR workflow. Automated threat detection, investigation, and response products provide comprehensive security in the cloud. Exabeam, the security analytics and automation company, today announced two new cloud-based security solutions, Exabeam Fusion XDR and Exabeam Fusion SIEM. The two new products enable efficient threat detection, investigation and response (TDIR) in the cloud without affecting a company's existing technology stack. Threat detection, investigation and response in ...

Read more

Cybersecurity with an inward view
Cybersecurity with an inward view - ransomware

Central defense: cybersecurity with an inward view. Due to the threat situation, organizations are strengthening their defense against cyber attacks from outside. In doing so, however, they often forget to look inward. New technologies help stop attackers who are already on the network. For cyber criminals, the corona crisis and its consequences mean a gold rush mood - never before have many companies been as vulnerable as they are today. However, IT security is slowly following in order to secure the attack surface, which has been enlarged by the distributed employees - and increases the security walls around the company and its employees in the home office. Many overlook ...

Read more

Detect hacker attacks earlier
Hacker attack

In companies, it is always important to detect hacker attacks as early as possible. A behavior analysis helps to shorten the "dwell time" of successful attacks. In films, hacks are often portrayed as a kind of digital bank robbery: the hackers break through the protective mechanisms of their target in a dramatic way and then only have a few minutes to steal the coveted data, while IT security tries desperately to stop the attackers. The reality looks very different, because in fact the cyber criminals usually make themselves comfortable in the network and sometimes spend months or years there ...

Read more