News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyberattacks: A threat to the supply chain

With the steady progress of digital transformation in recent years, companies have become increasingly dependent on numerous partners and suppliers. This shift has led to a more complex IT infrastructure and significantly expanded the attack surface that cybercriminals can exploit. They target the weakest link in the supply chain to gain access to the entire system. One example: In November 2024, the US software provider Blue Yonder fell victim to a ransomware attack that impacted the operations of 3.000 companies in 76 countries. This raises the question: How can we protect the entire…

Read more

EDR killers are a serious threat
EDR killers are a serious threat

EDR killers are malicious tools that disable the EDR software of compromised systems. This makes them vulnerable to further threats. The threat posed by EDR killers is increasing significantly. The BSI already pointed this out in 2024. A security expert offers tips on how companies can best protect themselves. Threat actors are constantly evolving in today's cybersecurity landscape, seeking new ways to penetrate companies with increasingly sophisticated tools and techniques. This constant "cat and mouse game" has led to Endpoint Detection and Response (EDR) killers, which, in conjunction with the emergence of new ransomware variants and...

Read more

Zero-Trust Architecture – Opportunities & Risks
Zero-Trust Architecture – Opportunities & Risks Image: Bing - AI

Trust is good, control is better: The Zero Trust architecture turns traditional security models on their head by auditing every access point—a revolutionary strategy that offers opportunities for greater security, but also poses challenges in implementation. The term Zero Trust is not just a technology, but a whole package of measures that pursues an improved security strategy. An interview with answers from Frank Jonas, Head of Enterprise Sales DACH, Kaspersky. 1. Why is Zero Trust a paradigm shift in cybersecurity, and which weaknesses of traditional security models does the concept address? The…

Read more

Home Office Security: What Your Company Should Know
Home Office Security: What Your Company Should Know Image: Bing - AI

Companies & Home Office: Without the protective walls of corporate IT, employees quickly become the first line of defense against cyberattacks – a challenge that companies often underestimate, but for which strong solutions exist. Companies should not underestimate the risks that can arise from employees working from home, especially when a private device is used instead of a company laptop. Here are 10 important questions and the relevant answers from an expert: Sören Kohls, Head of Channel DACH, Kaspersky. 1. What specific risks arise from using private networks in the home office, and how…

Read more

Zero Trust for RISE with SAP
Zero Trust for RISE with SAP

An SAP partner is now offering customers a Zero Trust Network Access (ZTNA) service that is natively integrated into "RISE with SAP". This enables SAP customers with previously on-premises ERP workloads to migrate to the cloud in a simplified and low-risk manner, without the complexity and risk of traditional VPNs. According to Zscaler's 2024 VPN Risk Report, 56 percent of cyberattacks on companies last year were due to VPN security vulnerabilities. These incidents underscore the growing need to move away from traditional perimeter-based defenses in favor of a more robust Zero Trust architecture to ensure secure access to critical ERP infrastructure...

Read more

IT Security 2025: Risks and Strategies
IT Security 2025: Risks and Strategies

In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working models and stricter regulations will shape the security strategies of the future. Dr. Sebastian Schmerl, Vice President Security Services EMEA at Arctic Wolf, gives an overview of the most important security trends and risks in 2025. Digital sovereignty will be more important than ever Control over one's own business processes is a top strategic priority for companies. This also brings the focus to ensuring one's own digital sovereignty. Many companies therefore opt for local outsourcing options, e.g.

Read more

Zero-Standing Privileges: Distinguishing Myth from Truth
Zero-Standing Privileges: Distinguishing Myth from Truth

What can the Zero Standing Privileges (ZSP) principle do and what is a myth? ZSP is an important component in identity security. However, its capabilities are often overestimated. Companies always need a comprehensive range of controls to adequately secure their complex hybrid and multi-cloud environments. When it comes to zero standing privileges, there are some myths to be aware of and some realities that are crucial to building a forward-looking Privileged Access Management (PAM) program. Knowing these myths and realities is important for companies to make informed decisions and implement effective security measures. CyberArk lists three of the most common...

Read more

Today is the deadline for NIS2
B2B Cyber ​​Security ShortNews

The deadline for NIS2 is today, October 17, 2024. Appealing to corporate responsibility in terms of IT security now is stale. Nevertheless, there are still too many companies in Germany that have not adequately protected their business processes and cannot guarantee their continuity and integrity. The aim of the NIS2 regulation on cybersecurity of network and information systems is to make as many companies as possible subject to security standards. This refers to 15 industries and over 160.000 organizations in Germany. Although security incidents and attacks are repeatedly reported, many hesitate...

Read more

Concepts against AI-based cyber attacks
B2B Cyber ​​Security ShortNews

AI-based attacks and the best defense: The topic of artificial intelligence continues to be omnipresent. AI is said to have similar potential to the steam engine or electricity. The field of cyber security is also being turned upside down by AI. In particular, AI-based attacks and the best defense against them are the focus of many discussions. AI-based attacks are very likely to be even more sophisticated, targeted and persistent than previous human attacks, which makes it extremely difficult to detect and fend off these attacks. AI-based attacks will therefore make attackers more likely to penetrate corporate networks and make them even more difficult to detect there.

Read more

Best-of-breed for cybersecurity
B2B Cyber ​​Security ShortNews

History repeats itself, even in the area of ​​cybersecurity. There are cycles of consolidation and modularization. Consolidation is currently being talked about again. The path to cyber resilience must be well thought out. But companies cannot afford to settle for less than the best. Because corporate IT security has never been under such pressure as it is today. Cyberattacks are frequent and costly, environments are complex and the perimeter is fragmented. Companies urgently need to strengthen their cyber resilience, especially in view of the increasing number of ransomware attacks. At the same time, the current economic situation has led to...

Read more