News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware on the rise
Ransomware on the rise

The new normal: ransomware on the rise. With the increased teleworking in companies due to the pandemic crisis, cybercrime has further upgraded and increased its ransomware capacities. In order to be able to keep pace with the other side despite changed conditions, companies must expand their IT security approach and strengthen their measures. Working from home as a result of the crisis helped a hitherto weak trend to become widespread in 2020: at the beginning of the pandemic, 75 percent of companies were working from home;

Read more

Ivanti launches Neurons for Zero Trust Access
ivanti news

Ivanti launches "Neurons for Zero Trust Access": Customers optimize security at the Everywhere Workplace. Ivanti Neurons for Zero Trust Access creates secure access considering users, devices, applications and networks. Ivanti, the automation platform that discovers, manages, secures and maintains IT assets from the cloud to the edge, launches Ivanti Neurons ™ for Zero Trust Access. The new solution helps companies to improve their security through a zero trust oriented and flexible solution. Ivanti is thus continuing its mission to secure the "Everywhere Workplace", where employees from different locations with different devices ...

Read more

Proactive hazard prevention using Microsoft Exchange as an example
Eset_News

Inside view of the IT infrastructure enables proactive hazard prevention. What the security gap in Microsoft Exchange shows us afterwards. In the first quarter of this year, the Microsoft Exchange security gap that had become known rightly caused major headaches for many IT managers. In Germany alone, the CERT-Bund, which is part of the Federal Office for Information Security (BSI), assumed at least 2021 vulnerable Exchange servers in March 26.000. Over 26.000 Exchange servers affected How high the total damage was for the companies affected can hardly be quantified, as no information about this was made available to the general public. In individual cases,…

Read more

Trend Micro offers a comprehensive zero trust solution

Risk information enables protection for hybrid work models even after the pandemic. Trend Micro, one of the world's leading providers of cybersecurity solutions, provides insights into the security status of identities and devices based on comprehensive risk information. For customers, this is critical to achieving true zero trust security. According to the analyst firm Forrester (1), “Zero Trust Network Access (ZTNA) is the security technology characteristic of the corona pandemic. While it (ZTNA) gently relieves users of outdated VPN technologies, it has led companies to re-use security (and networks) both now and in the future.

Read more

Zero Trust against identity fraud

Due to increased remote work, IT administrators, security teams and regular employees are currently heavily dependent on remote access to corporate systems, DevOps environments and applications. This means that threat actors have a much larger attack surface at their disposal: identity fraud. Digital identities have proven to be the weapon of choice for cyber criminals. If privileged users of a company routinely use shared privileged accounts for access - especially remotely via a VPN - any attacker who compromises these credentials has, in the worst case scenario, extensive access to company-critical data and resources. In addition, not only are ...

Read more

On the trail of insider risk
On the trail of insider risk

Be it cyber attacks or the theft of sensitive data - the majority of companies recognize attacks from outside as a real danger. However, as the current Cyber ​​Security study by IDG market research shows, only just under 20 percent of the organizations surveyed rate insider risks as a threat. A mistake that can cause great damage. As part of its "1×1 of IT security" series, Microsoft explains how companies protect themselves from insider threats. According to the Cyber ​​Security study, 55 percent of the organizations surveyed in the DA-CH region have been victims of data theft by former or current employees. To go to a…

Read more

Don't trust anyone: zero trust
Don't trust anyone: zero trust

With the increasing threat landscape and increased demands on data security, the zero trust security model has gained significantly in popularity among companies. Most traditional approaches to network security focus on strong protections against unauthorized access. Their weakness, however, is the trust that users and entities automatically enjoy as soon as they are in the network. If cybercriminals succeed in gaining access to the network, there is often very little that prevents them from moving freely there and smuggling sensitive data out. The zero trust concept therefore suggests that all access be blocked ...

Read more

ESET at it-sa 365
Eset_News

ESET can be reached and provides information at it-sa 365. The IT security trade fair in Nuremberg is also of great digital interest for ESET. Right at the opening there will be a lecture on the subject of “Zero Trust Security”. ESET remains loyal to the IT security trade fair it-sa and its digital response to Corona "it-sa 365" (October 6-8, 2020) even in difficult times. At the IT security manufacturer, this year's trade fair activities revolve around the question of which holistic security approaches companies can use to guarantee the security of their IT infrastructure. Because the effects of Covid-19 is just one of the rapidly changing framework conditions that companies...

Read more