News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Trends: Cybersecurity and Cloud Native Technology for 2024
Trends: Cybersecurity and Cloud Native Technology for 2024

What are the five most important cybersecurity and cloud native technology trends for 2024? Rise of 1000x developers and hackers, AI poisoning attacks and certificate-related failures will pose challenges for the security industry. Venafi, the maker of machine identity management, today released its 2024 cybersecurity and cloud native landscape predictions. AI poses new threats and exacerbates existing risks, the lifespan of machine identities decreases, and the authenticity of codes is subject to stricter scrutiny. As a result, the coming year will be challenging for the security industry. “In 2023, companies will have a wave of…

Read more

Firefly protects machine identities in cloud-native workloads
Firefly protects machine identities in cloud-native workloads

Venafi, the inventor and leader in machine identity management, introduces Firefly. The solution supports highly distributed cloud-native environments. As part of Venafi's machine identity control plan, it enables easy and secure implementation of developer-driven machine identity management requirements for cloud-native workloads. Machine identities such as TLS and SPIFFE are deployed locally and at high speed in any environment. By adding speed, reliability, and security to machine identities in modern environments, organizations can ensure trust in issued certificates and compliance with corporate security policies while streamlining application development.

Read more

Cloud bursting vulnerability
B2B Cyber ​​Security ShortNews

As an application delivery technique, cloud bursting enables the best of both worlds to be combined. On the one hand, it allows running an application in a private data center, with known, fixed investment costs, complete control over the environments and organizational expertise to run them. On the other hand, it is used in a public cloud that is available on demand and has almost unlimited resources. This means you only pay for additional resources when you need them. In short, cloud bursting is a hybrid cloud delivery model that is similar to pay-as-you-go...

Read more

Code signing certificates misused
B2B Cyber ​​Security ShortNews

On February 15, Australian antivirus manufacturer Emsisoft announced that a security incident had occurred in which a fake code-signing certificate was used to disguise a targeted attack against an organization. The attacker's goal was to trick the affected organization into allowing an application that the threat actor had installed and intended to use by making its detection appear as false positives. The attack failed, the antivirus software detected and blocked it. The method by which initial access was gained is still unclear, but most likely either a brute force attack on…

Read more

2 out of 3 companies see geopolitics and cybersecurity as inseparable
B2B Cyber ​​Security ShortNews

A Venafi survey shows: over 60 percent of companies suspect that they have been the target of nation-state attacks or are affected by them. According to the current study, two-thirds of companies have changed their cyber strategy in response to the war in Ukraine. Venafi, the inventor and leading provider of machine identity management, publishes the results of a recent study examining the impact of attacks by actors on behalf of nation states and recent geopolitical changes on IT security. The survey of more than 1.100 security decision-makers worldwide (201 of them in DACH) showed that 66 percent (69…

Read more