News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protecting identities and access
Protecting identities and access

A European cybersecurity provider and identity and access management expert, announces the launch of its SaaS platform, Wallix One. The platform includes the essential solutions companies need to protect their digital activities. This means that employees, external service providers, IT administrators, PLC maintenance personnel or machines and robots only receive access to IT or OT infrastructures, devices, applications and data after their identity and the rights granted to them have been verified. Outsourcing the management of identity and access security solutions to Wallix One offers IT security managers several advantages: control over access to important company resources, reduction of the risks associated with identity theft…

Read more

Insecure video conferencing
B2B Cyber ​​Security ShortNews

Online meetings offer cybercriminals a good opportunity to cause enormous damage to companies. The cases of industrial espionage via video conference, hacking or data theft are increasing. Video conferencing is part of everyday life in many companies. However, companies often forget that online meetings also harbor risks, especially if they do not consider security measures. Even without much effort, companies can find out whether they are exposed to an increased risk of cyber attacks during their video conferences. Lack of access control Companies often send login links to their employees to give them access to online meetings. Login links may provide a convenient way of access, but they also make it easier for cybercriminals to…

Read more

Zero Trust: Firewalls and passwords are no longer relevant
Zero Trust: Firewalls and passwords are no longer relevant

Three theses for the future of Identity & Access Management. Zero Trust makes firewalls and passwords irrelevant. Multi-factor authentication is also a must for access. The protection of sensitive company networks and critical infrastructures is increasingly in focus in view of the tense security situation. Cyber ​​security concepts currently in use are often put to the test. It is becoming increasingly clear that classic firewall concepts alone are no longer able to offer sufficient resistance to hybrid attack patterns. A modern and centrally organized identity and access management is of particular importance. In this context, becom mentions three essential theses:…

Read more

ARP-GUARD add-on offers network integrity to the endpoint
B2B Cyber ​​Security ShortNews

New ARP-GUARD add-on offers network integrity to the endpoint. It improves the security situation and helps to analyze the IT assets in the internal and external network. The corona pandemic has permanently changed the world of work. In particular, the trend towards location-independent, decentralized work will continue even after the crisis. Home office, remote or hybrid work, however, place increasing demands on network security for almost every industry. Because the growing number of cyber attacks, the Internet of Things and the increasing use of the cloud require better protection of end devices as well as interference-free and secure network connections. The software ARP-GUARD, the German ...

Read more

Insider risk: prevent misuse of access

The enemy inside: Insider threats through misuse of privileged authorizations. If there is a lack of measures to control and restrict the access rights of employees in a granular way, this represents a considerable risk for company security. The solution: the implementation of a least privilege approach. Cracking the code, defeating a boss, or discovering a lost key - these are all ways to level up in video games. Then players get access to new tools, powers or other components that will ultimately help them to victory. In many ways, the network infrastructure is similar to a video game. Employees have access to ...

Read more

Security risk: orphaned access systems
Security risk: orphaned access systems

Access control systems as a potential security risk: offices around the world are orphaned in the pandemic, as they are usually only between the years. Last autumn, the Federal Office for Information Security (BSI) warned that cyber criminals could exploit the situation. Due to the pandemic, many offices are orphaned as they usually have only been between the years. The BSI has already issued a warning. But danger does not only come from the network. Empty company rooms can also pose a risk if they are equipped with inadequately secured or outdated access systems. RFID is easy to fish One scenario could, for example ...

Read more