News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Counter insider threats
Counter insider threats

Being responsible for IT is not the easiest job at the moment. When, in addition to the constant warning about external attacks and the requirement of zero trust principles, there is also the warning about internal insider threats, as a CISO you can ask yourself who else you should trust. Insider threats are a real problem for companies of all types and sizes. A current example is the electric car manufacturer Tesla: Last year, over 100 gigabytes of sensitive data and salary information from tens of thousands of employees across Europe, as well as reports of malfunctions and problems with the products, were received at the Gigafactory Berlin-Brandenburg...

Read more

Cyber ​​danger: HTML smuggling
Cyber ​​danger: HTML smuggling

With HTML smuggling, the malicious file is first created on the user's computer. Therefore, traditional anti-malware programs and sandboxes do not detect the attack. AI-based browser isolation provides protection. HTML smuggling is a highly efficient malware distribution technique that uses legitimate HTML5 and JavaScript functions to infect. This smuggling technique distributes Remote Access Trojans (RATs), banking malware, and other malicious payloads because HTML smuggling bypasses traditional security controls such as web proxies, email gateways, and legacy sandboxes. Attackers hide their activities in seemingly harmless web traffic, making it difficult for security tools to...

Read more

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more

Strengthening cyber resilience – tips for CISOs
Strengthen cyber resilience - tips for CISOs

As digitalization grows, cyber threats also grow. Chief information security officers (CISOs) must regularly adapt their strategies. AI-driven threat defense is a strategy. As the digital landscape expands, so do the dimensions of the risks. Traditional cybersecurity concepts that once sufficed have been made obsolete by the relentless and ever-evolving nature of cyber threats. Therefore, the CISO's strategy must adapt and transform from a static set of rules into a flexible manual. From redesigning prevention strategies to strengthening defense measures to promoting resilience as a central part of...

Read more

Identity and Access Management (IAM) alone is not enough
Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM. Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because...

Read more

Whaling: AI-supported attacks on the big fish!
Whaling: AI-supported attacks on the big fish! - Image by istvangyal on Pixabay

The attackers try to catch the big fish in the company: In cybersecurity, this is called “whaling”. AI-powered whaling attacks threaten CEOs, lawmakers and the military. “Harpoon Whaling” is the refined method with VIP service. “Whaling” is about catching big fish. The targets of cybercriminals are executives of successful companies, high-ranking officials and military personnel. It's about stealing information or siphoning off large sums of money. The Harpoon Whaling in particular - a subspecies of Whaling - is perfidious because the attackers automatically collect extensive information about their victims and organize it using nested…

Read more

Many IT decision-makers don’t trust their security team
Kaspersky study: Many IT decision-makers do not trust their security team

Only 60 percent of decision-makers believe that their own security team can correctly assess the risk posed by attacks. On the other hand, 41 percent believe their team can detect an incident within minutes. In many cases, decision-makers in companies in Germany doubt the capabilities of their IT security team, as the current Kaspersky study “Incident Response for Prevention – Why companies in Germany are poorly prepared for cyber attacks and how they can become more cyber-resilient thanks to incident response methods” shows. Almost a fifth of companies rely on Zero Trust Zero Trust as a security principle that basically covers every action...

Read more

Zero Trust: Endpoint agents as a VPN replacement
Endpoint agents as a virtual private network replacement - Image by Gerd Altmann on Pixabay

Organizations can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. New endpoint agents for macOS and Windows serve as a complete replacement for traditional virtual private networks. Lookout has announced new Windows and macOS endpoint agents for its Lookout Secure Private Access Zero Trust Network Access (ZTNA) solution, facilitating the complete replacement of overburdened virtual private networks (VPNs) with cloud-based security. Enterprises can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. According to analysts at Gartner, by…

Read more

SASE: Secure Access Service Edge
SASE: Secure Access Service Edge

As corporate networks grow, so do security requirements. It is no longer enough to set up security barriers in the central data center. The solution is called SASE. Instead, organizations must secure all external endpoints in their IT landscape. This includes devices used by employees in the home office, but also workstations in branches or cloud applications. The solution for providing security features where they should be effective - i.e. at the edge - is called SASE (Secure Access Service Edge). SASE combines the functions of a decentralized network with security services from the cloud and is virtually a must…

Read more

Zero Trust Best Practices
Zero Trust Best Practices

The rapid shift towards more remote work and the associated explosion in devices has dramatically increased the number of cyber threats. With this in mind, organizations face the challenge of protecting their highly complex cloud-based technology ecosystems as people, software and even partner organizations can pose a threat to the security of valuable systems and data. As a result, the Zero Trust approach has established itself as a popular security framework. Analyst firm Markets and Markets forecasts that global spending on Zero Trust-based software and services will grow to $27,4 billion in 2022 from $60,7 billion.

Read more