News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security Cloud in the cloud and in SaaS environments
Security Cloud in the cloud and in SaaS environments

Rubrik, the Zero Trust Data Security Company, introduced the Rubrik Security Cloud to protect business data wherever it resides—in enterprise, in the cloud, or in SaaS environments. Ransomware is on the rise and cyberattacks are becoming increasingly sophisticated. Despite investing in infrastructure security tools, cybercriminals are still getting their hands on the data. If they compromise them, they bring the entire business to a standstill. It is therefore time to establish a new approach. The next level of cybersecurity combines investments in infrastructure security with data security, so…

Read more

Zero Trust: Paradigm Shift in Cybersecurity
Zero Trust: Paradigm Shift in Cybersecurity

Never trust, always verify – the “Zero Trust” security model follows this motto. No actor wishing to access resources is trusted. Rather, each individual access requires authentication. Time for a paradigm shift in cybersecurity. A comment from Sebastian Ganschow, Director Cybersecurity Solutions at NTT Ltd. The thinking behind Zero Trust is simple: implicit trust is itself a vulnerability that attackers can exploit for lateral movement and access to sensitive data. Because the fortress – i.e. the company network – has not been impregnable for a long time. Data…

Read more

Digital Workplace: Managers fail to recognize security gaps
Digital Workplace: Managers fail to recognize security gaps

The security provider Ivanti has presented the results of a study on security in the digital workplace. This makes it clear: IT has created the digital workplace - but now it is important to protect it against new attack vectors. 24% of those responsible for IT believe that IT security is only partially equipped for the digital workplace. In fact, when it comes to IT security in the remote working world, there is still room for improvement, even if management sometimes takes a different position than IT. Lack of influence of IT on the design of the Digital Workplace The study basically suggests: The Digital Workplace…

Read more

Zero Trust: Firewalls and passwords are no longer relevant
Zero Trust: Firewalls and passwords are no longer relevant

Three theses for the future of Identity & Access Management. Zero Trust makes firewalls and passwords irrelevant. Multi-factor authentication is also a must for access. The protection of sensitive company networks and critical infrastructures is increasingly in focus in view of the tense security situation. Cyber ​​security concepts currently in use are often put to the test. It is becoming increasingly clear that classic firewall concepts alone are no longer able to offer sufficient resistance to hybrid attack patterns. A modern and centrally organized identity and access management is of particular importance. In this context, becom mentions three essential theses:…

Read more

Better access protection through Zero Trust Network Access
Better access protection through Zero Trust Network Access

Zero Trust is the answer to modern cybercrime, and Sophos is putting that belief into action by integrating its Zero Trust Network Access (ZTNA) solution with its Intercept X endpoint solution. This further simplifies and improves protection against ransomware and future threats on the cyber floor. An interview with Michael Veit, security expert at Sophos. In their history, cybersecurity products have primarily focused on preventing malicious code from entering and executing computers. However, a trend can currently be observed that requires a rethink: the growing certainty that…

Read more

High-growth companies take on high cyber risks
High-growth companies take on high cyber risks

Despite their enormous financial success, high-growth companies tend to be careless when it comes to IT security. A recent Beyond Identity study of more than 1.100 workers shows how vulnerable high-growth companies are to cyber risk. According to the survey, only 62 percent of respondents believe their thriving employers are proactive about online safety. At the same time, just over half (55%) of employees confirm that they take even the most basic precautions, such as B. the restriction of administrative network rights. Poor password hygiene in companies Looking specifically at employers' password tactics, it shows…

Read more

New zero-trust approach at the identity level

Zero Trust has now become one of the most important security models. The concept is simple and intuitive: implicit trust is a vulnerability in itself, which attackers can exploit for lateral movement and access to sensitive data. The Zero Trust approach attempts to mitigate this risk by eliminating implicit trust from the corporate environment. Zero Trust always assumes that a security breach has already occurred. For example, an attacker managed to bypass some of the defenses in place and gain a foothold in the enterprise environment. In the next attack phase, the hacker moves...

Read more

The Firewall Metamorphosis: Infrastructures in the Cloud
The Firewall Metamorphosis: Infrastructures in the Cloud

More and more companies are moving resources and infrastructure to the cloud. In view of this development, conventional firewalls are reaching their limits. Hybrid work and network security must be combined: the firewall metamorphosis. A comment by Michael Veit, Technology Evangelist at Sophos. The current evolution of the modern workplace suggests that both traditional and cloud environments are merging into a world where hybrid security infrastructure use cases will dominate the future of network security. This is where SASE approaches can offer the highest level of flexibility for companies to interact on both sides of the spectrum and…

Read more

Sophos ecosystem relaunched with Zero Trust technology

Zero Trust is the answer to modern cybercrime, and Sophos is putting that belief into action by incorporating its Zero Trust Network Access (ZTNA) solution into its Intercept X endpoint solution. This further simplifies and improves protection against ransomware and future threats on the cyber floor. With Sophos ZTNA, Sophos presents its latest product in the fight against cyber threats. It is a zero trust network access module that fully integrates with the Intercept X endpoint solution, providing advanced endpoint protection plus zero trust network access with a single agent. Sophos ZTNA introduces…

Read more

CrowdStrike: Zero Trust support on macOS and Linux

CrowdStrike Falcon ZTA helps organizations implement a holistic cybersecurity approach to protect data and users from supply chain attacks, ransomware and wormable exploits. CrowdStrike extends Zero Trust support to macOS and Linux, enabling cross-platform protection. CrowdStrike Inc., a leading provider of cloud-based endpoint, workload, identity and data protection, announced that Zero Trust Assessment is now available for macOS and Linux. With this, CrowdStrike extends its comprehensive protection to all platforms with an identity- and data-centric approach. Additionally, CrowdStrike announced new Zero…

Read more