News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New solutions for Zero Trust and Managed XDR
Barracuda News

Barracuda announces updates to Email Protection, Zero Trust Access, Data Protection and Managed XDR. Cloud security specialist offers customers and partners a comprehensive, easy-to-use and efficient solution portfolio. Cloud security specialist Barracuda announces several important product innovations in the areas of email security, zero trust access, managed XDR and data protection. The numerous new functions protect against ongoing and evolving cyber threats such as ransomware and help customers to solve complex digital transformation challenges. Zero Trust Access As part of Barracuda's SASE platform, Barracuda CloudGen Access now includes web security with the…

Read more

NetCloud with zero-trust security for 5G and SD-WAN  
NetCloud with zero-trust security for 5G and SD-WAN

Cradlepoint has announced NetCloud Exchange: a cloud-native solution built on policy-driven Zero Trust principles, delivering multiple SD-WAN and security services. The extension of the NetCloud management software enables companies with private or cloud-based data centers - thanks to more IT security - to increase the possibilities of their 5G installations, to offer new services and at the same time to digitally transform their business processes. Cloud computing and mobility The digital transformation of companies requires the increasing use of cloud computing and mobility as well as the Internet of Things. However, WAN architectures have proven to be too limited and inflexible to accommodate distributed enterprise locations, vehicles, devices...

Read more

Busted: Myths about Zero Trust
Busted: Myths about Zero Trust

In recent years, Zero Trust has become a buzzword for businesses. This often includes on-premises and cloud applications, a hybrid workforce, and a growing set of identities. Time to dispel some myths. It is this new world, in which IT environments and users are increasingly distributed, that is driving the adoption of Zero Trust. Instead of the “castle and moat” approach, where devices are trusted within the network, the model is based on the idea that users and devices should never be trusted by default. However, around Zero Trust there is…

Read more

Report: Growing threats from unencrypted devices
Report: Growing threats from unencrypted devices

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment. A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident. 16 percent unencrypted devices When an unencrypted device is connected to a corporate network in an office environment, the risk of a security incident is reduced. In the world of…

Read more

Combat identity-based attacks with Zero Trust
Combat identity-based attacks with Zero Trust

Identity-based threats have become a major source of attacks and data breaches. As a result, organizations today require improved identity awareness and new threat mitigation strategies, which is best achieved by implementing an identity-based Zero Trust approach. Below are the basics of how the Zero Trust model works and best practices for implementing it effectively. The Zero Trust model is a security approach based on the idea that organizations shouldn't automatically trust everyone inside or outside the infrastructure perimeter. Instead, every entity or user trying to access the system must verify themselves. What is…

Read more

Pitfalls of Cloud Computing
Pitfalls of Cloud Computing

New report shows the pitfalls of cloud computing: Cloud computing has already become the standard in many areas in recent years. But as practical as using the cloud is, security should not be neglected. The use of cloud computing has accelerated significantly over the past two years and is likely to become the dominant model for hosting data and programs in the foreseeable future. Today it is already indispensable in many areas, for example when working together on documents and databases across different locations and...

Read more

Understand Zero Trust and apply it in the company

ESET offers interested parties a free ePaper on the topic: Understanding Zero Trust and applying it in the company. ESET explains the free basic knowledge about Zero Trust in its security blog. The IT security manufacturer ESET has published a free ePaper on the subject of Zero Trust. In this article, the experts explain what Zero Trust actually is, how the alternative approach to IT security has evolved over the years, and how organizations can take the first step away from the perimeter-based IT security structure to the comprehensive Zero Trust model. IT security: investments of almost 7 billion euros Investments in IT security are increasing…

Read more

IT security: Excuses do not protect
B2B Cyber ​​Security ShortNews

Cyber ​​risks are constantly increasing. However, the necessary investments in IT security often remain insufficient because many companies feel adequately protected. However, this is often a fallacy and associated with extremely high security risks, says security expert CyberArk. Many companies are actively driving digitization forward. However, the topic of cyber security is neglected. This is confirmed by 73 percent of the IT decision-makers surveyed in Germany in a recent study by CyberArk. Excuses instead of investments Companies give various reasons for not investing in security. Common statements are: "We are already secured enough, for example with perimeter protection."...

Read more

Work-from-anywhere model harbors increased cyber risk potential
Work-from-anywhere model harbors increased cyber risk potential

Absolute Software publishes results from the latest IT security study: Increasing device mobility together with the vulnerability of security controls underlines the need for robust endpoint and secure access solutions. Absolute Software shares its in-depth insight into the increased risk organizations face as the ongoing shift from work from home to work from anywhere. Absolute is a leading provider of self-healing endpoint and secure access solutions. The Value of Zero Trust A new report titled “The Value of Zero Trust in a Work-from-Anywhere World” shows that as of March 2022, the average enterprise IT endpoint…

Read more

86 percent want to increase their IT security budget by 2024
86 percent want to increase their IT security budget by 2024

Many companies are aware of the operational dangers of IT incidents. They are planning investments in technology and know-how and are also approaching new security approaches such as Zero Trust. In the current survey, 86 percent of companies state that they want to increase their IT security budget by 2024. A survey by techconsult, in which Sophos participated, shows what technical decision-makers from trade, industry or service providers expect from security solutions. Over 50 percent have had an attack More than half of all respondents (52 percent) have had under one (12 percent) or…

Read more