News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

MDR: Advanced Managed Detection and Response service
MDR: Advanced Managed Detection and Response service ms-KI

Cybersecurity specialist Bitdefender has presented its further developed offering for managed detection and response services. Companies and organizations can now obtain two different levels of the service: MDR and MDR PLUS are tailored to the specific needs of customers depending on the industry and place of origin or taking into account other risk factors such as the respective supply chain. Bitdefender MDR continuously monitors, detects and responds to threats. In addition, the service offers active threat hunting. Security analysts guide customers with their advice and advise them on the risk situation. Centralized management of services from a single point…

Read more

Cloud Security Solutions for Managed Service Providers
Cloud Security Solutions for Managed Service Providers - AI - Bing

Bitdefender has introduced GravityZone Cloud MSP Security Solutions, a new offering for managed service providers (MSP). It provides leading endpoint protection and managed detection and response (MDR) services to detect and remediate cyber threats in any environment and strengthen overall cyber resilience. Bitdefender GravityZone Cloud MSP Security Solutions are based on GravityZone, Bitdefender's unified security and risk analytics platform that provides advanced Endpoint Detection and Response (EDR), Extended Detection and Response (XDR) and cloud security for physical, virtual and multi- cloud environments. The platform provides in-depth information in the context of identified threats. User…

Read more

NIS2 is just around the corner
NIS2 is just around the corner

In a few months, numerous companies will have to implement the NIS2 directive. The new EU directive requires strict measures to be implemented to ensure cybersecurity. At first glance, this period of time may seem long enough, but building an adequate security structure does not happen overnight. NTT Ltd., a leading IT infrastructure and services company, clears up misconceptions surrounding the NIS2 Directive and shows the best way to implement it. ​The NIS2 Directive is an EU-wide network and information security legislation that came into force on January 16, 2023 and has been adopted by member states…

Read more

AI-based security assistant
AI-based security assistant

A data-centric cybersecurity specialist, expands its AI and machine learning capabilities with the launch of Athena AI, a new generative AI layer spanning the entire Varonis Data Security Platform. Athena AI fundamentally improves the way security teams protect data, from visibility to action execution. Using natural language makes in-depth research and analysis much easier and more efficient. In this way, users of all skill and competence levels become security specialists. Generative AI SOC analyzes: Athena AI’s insights and measures help...

Read more

More security with MDR – Cybersecurity as a Service
More security with MDR – Cybersecurity as a Service - Image by Gerd Altmann on Pixabay

NDR – Network Detection & Response is now considered a security technology in IT security that should not be missing from any company network. But who evaluates all the data and leads the response? The magic word here is MDR – Managed Detection and Response Services. An interview with Michael Veit, security expert at Sophos. Effective security solutions include technological components such as networked endpoint protection, a next generation firewall, both paired with artificial intelligence and human expertise in the form of security services. While classic security solutions can detect and ward off a large number of attacks and malicious anomalies, it has long...

Read more

Basics of Effective Security Operations (SecOps)
Basics of Effective Security Operations (SecOps)

The ongoing threat of cyber attacks continues to pose major challenges for companies. Many people now rely on external providers when it comes to SecOps. But even then, IT security is not a sure-fire success; it requires certain prerequisites. Ontinue, expert in Managed Extended Detection and Response (MXDR), defines five core principles that are crucial for the success of SecOps. IT security experts summarize all operational activities in their area of ​​expertise under the term SecOps - i.e. security operations. Since the portfolio of tasks is very broad, companies need a Security Operations Center (SOC) to manage their IT infrastructure...

Read more

Large gaps in Detection & Response in the OT area
Large gaps in Detection & Response in the OT area - image by Pete Linforth from Pixabay

A new report reveals that enterprise security operation centers (SOCs) are looking to extend detection and response into the OT space. However, a lack of employee visibility and knowledge poses significant barriers, according to a study by Trend Micro. According to the study by the Japanese cybersecurity provider, half of the companies now have an SOC that shows a certain degree of ICS/OT (Industrial Control Systems / Operational Technology) transparency. But even among the companies surveyed that have a more comprehensive SOC, only about half (53…

Read more

SOCs: 1,5x increase in cyberattack detections

Kaspersky's new Managed Detection and Response Analyst Report has some key findings: The number of cyberattacks found by SOCs increased by 1,5x in 2022. Detection takes around 44 minutes on average. That is 6 percent longer than last year. For the past year, Security Operations Centers (SOC) have detected more than three major incidents per day. Roughly one in three (30%) fatal attacks in 2022 were related to an Advanced Persistent Threat (APT), while a quarter (26%) were due to malware. These results…

Read more

Caught: Black Basta structure X-rayed
Caught: Black Basta structure X-rayed

The security provider Quadrant managed to follow a Black Basta attack live and to evaluate the technical background. The experts do not know the processes at Black Basta, but have also uncovered the loopholes, which can now be monitored. This is a heavy blow for the entire structure of Black Basta, which can no longer be used in this way. Quadrant recently assisted a customer in an enterprise-wide compromise by the Black Basta ransomware group. This group is a ransomware-as-a-service (RaaS) organization known to target mid-sized and large enterprises...

Read more

IT security teams provide answers on corporate security

A survey of 500 employees in IT security teams shows that corporate security is lagging behind in terms of protective measures in view of the increased threat situation. Compared to the previous year, only almost half as many German companies are optimally prepared for security incidents. Since the beginning of the war in Ukraine, the IT security situation in German companies and around the world has worsened again: More than two thirds (68 percent) of the IT security teams in Germany have since registered an increase in security incidents, 43 percent of them report significantly more incidents than before. Many IT security teams do not see themselves in a good position With the…

Read more