News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Secure access through Zero Trust SD-WAN
Secure access through Zero Trust SD-WAN

A leading cloud security provider has announced a new Zero Trust SASE solution built on Zero Trust SD-WAN. It connects all branches with each other and secures data traffic. The industry's first single-vendor SASE solution is powered by Zscaler Zero Trust AI and helps organizations reduce costs and complexity while implementing zero trust security for users, devices and workloads. In addition, Zscaler announces the availability of the Zero Trust SD-WAN solution and its plug-and-play appliances. This solution enables customers to provide secure connectivity for branches, factories and data centers while…

Read more

Build zero trust architecture
Build zero trust architecture

According to the recent study, What's Next in Cyber: A Global Executive Pulse Check, 47 percent of respondents agreed that maintaining a secure hybrid workforce is one of the top reasons for adopting a Zero Trust Architecture (ZTA). However, 98 percent of CXOs in the same survey agreed that they find implementing zero trust difficult for three main reasons: those responsible don't know where to start and how to prioritize. There is a lack of qualified providers with a complete and integrated solution. There is also a lack of…

Read more

Enemies in the home office
Home office danger security

In the area of ​​IT security and home office, the burdens are not distributed in favor of the companies: While they have to permanently take all security measures appropriate to the threat situation across their entire IT landscape, attackers can use a small weak point to cause massive damage. Unsecured end devices in the company or in the home office, cloud and IaaS applications, poorly secured networks or surfing the World Wide Web open up numerous opportunities for hackers to infiltrate companies and steal data. Since the latter can be easily turned into money, cyber criminals have a correspondingly high level of motivation to refine their attack techniques and ...

Read more