News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Today is the deadline for NIS2
B2B Cyber ​​Security ShortNews

The deadline for NIS2 is today, October 17, 2024. Appealing to corporate responsibility in terms of IT security now is stale. Nevertheless, there are still too many companies in Germany that have not adequately protected their business processes and cannot guarantee their continuity and integrity. The aim of the NIS2 regulation on cybersecurity of network and information systems is to make as many companies as possible subject to security standards. This refers to 15 industries and over 160.000 organizations in Germany. Although security incidents and attacks are repeatedly reported, many hesitate...

Read more

Concepts against AI-based cyber attacks
B2B Cyber ​​Security ShortNews

AI-based attacks and the best defense: The topic of artificial intelligence continues to be omnipresent. AI is said to have similar potential to the steam engine or electricity. The field of cyber security is also being turned upside down by AI. In particular, AI-based attacks and the best defense against them are the focus of many discussions. AI-based attacks are very likely to be even more sophisticated, targeted and persistent than previous human attacks, which makes it extremely difficult to detect and fend off these attacks. AI-based attacks will therefore make attackers more likely to penetrate corporate networks and make them even more difficult to detect there.

Read more

Best-of-breed for cybersecurity
B2B Cyber ​​Security ShortNews

History repeats itself, even in the area of ​​cybersecurity. There are cycles of consolidation and modularization. Consolidation is currently being talked about again. The path to cyber resilience must be well thought out. But companies cannot afford to settle for less than the best. Because corporate IT security has never been under such pressure as it is today. Cyberattacks are frequent and costly, environments are complex and the perimeter is fragmented. Companies urgently need to strengthen their cyber resilience, especially in view of the increasing number of ransomware attacks. At the same time, the current economic situation has led to...

Read more

Ransomware: Company pays $75 million ransom
Ransomware: Company pays $75 million ransom

According to the latest report, ransomware attacks are 18 percent higher than last year. Germany ranks third among the countries with the most ransomware attacks. The manufacturing and healthcare industries are particularly targeted. Zscaler, Inc., a leader in cloud security, shows an overall increase in ransomware attacks of 2024 percent compared to the previous year in its annual ThreatLabz 18 Ransomware Report. The annual report describes the latest trends and targets of ransomware attacks, ransomware families and effective defense strategies. The report's findings also reveal a record-breaking ransom payment of $75 million...

Read more

VPN security concerns are rising
VPN security concerns are rising

According to a report, 78 percent of organizations plan to implement a Zero Trust strategy in the next 12 months to respond to increasing attacks on VPNs. VPN security concerns are on the rise: 91 percent of respondents expressed concerns that VPNs could lead to security incidents. According to the report, the top threats exploiting VPN vulnerabilities are ransomware (42 percent), other malware (35 percent) and DDoS attacks (30 percent). Lateral movement is the biggest concern, according to the majority of organizations with a VPN-based security incident, indicating a failure to contain. 56 percent…

Read more

Risk of VPN attacks: every second company affected
Risk of VPN attacks: every second company affected Image: Bing - AI

The VPN Risk Report shows that more than half of companies were affected by cyberattacks via VPN in 2023. According to the Zscaler ThreatLabz Report 2024, 78 percent of companies plan to implement a Zero Trust strategy in the next 12 months. ThreatLabz VPN Risk Reports 2024: As part of this study, Cybersecurity Insiders surveyed over 600 IT security, IT and networking professionals. 56 percent of participating companies said they had been the target of cyberattacks in the past year that exploited security vulnerabilities in VPNs. These incidents underscore the vulnerability of traditional perimeter-based…

Read more

Olympic Games targeted by cyber criminals
Olympic Games targeted by cyber criminals

After the European Football Championship, the next major event is just around the corner. The Summer Olympics in Paris are not only likely to captivate sports fans all over the world, but also attract the attention of cyber criminals. However, this is nothing new, as the history of cyber attacks shows. There have been predictions since 2004 that the Olympic Games could also be the target of cyber attacks. But although no games have been seriously affected so far, there is reason to believe that this year could be different. With the increasing…

Read more

Identity Fabric as the driving force of Zero Trust
Identity Fabric as the driving force of Zero Trust

For IT managers who want to streamline their access management and bring it into line with legal regulations, there is a concept that not all IT experts are necessarily familiar with: Identity Fabric (IF). An Identity Fabric is the infrastructure for a company's identity and access management (IAM). It includes a mix of modular IAM tools for hybrid and multi-cloud environments, supports any human or machine identity, offers advanced analytics and supports standards-based identity integrations. To understand how great the progress that Identity Fabric makes compared to previous identity management, it is worth taking a look at the concept. Because IF...

Read more

Security: New Microsoft Entra Suite with Defender at its core
Microsoft is launching the new Microsoft Entra Suite and the Unified Security Operations Platform. These new solutions are designed to simplify the zero-trust security strategy and modernize security operations by providing comprehensive and integrated security solutions. Image by Gerd Altmann on Pixabay

Microsoft is launching the new Microsoft Entra Suite and the Unified Security Operations Platform. These new solutions are designed to simplify the zero-trust security strategy and modernize security operations by offering comprehensive and integrated security solutions. With the Entra Suite, the Redmond-based company aims to help companies modernize their security strategies, improve threat defense, and optimize identity and access rights management. The solutions are designed to meet the challenges of the modern cyber threat landscape while meeting operational requirements for efficiency and compliance. Microsoft Entra Suite The Entra Suite includes…

Read more

Negative Trust as a complement to Zero Trust
a fire hydrant spewing water out of the ground, an icelandic landscape, by Rebecca Horn, tinnitus, biopunk environment, detailed », latitude and longitude, post+processing, under a shower, apocaliptic contamination, landfill, high-end onsen, 303, ( land )

Negative Trust as a further development of Zero Trust: Trust without threatening consequences has long since ceased to exist in IT security. Only in an ideal world are companies able to equip their own workforce with all possible skills, roles and access without worrying about possible consequences or misuse. In fact, this security paradigm of positive trust through security at the network perimeter has been practiced for decades. Once an employee was authorized for network access, he or she could usually move around the entire IT environment unhindered. However, such a concept opened up…

Read more