Encryption

Unmistakable Clues to An APT Attack

Unmistakable Clues to An APT Attack-

APT hackers avoid verifiable events, error messages, or service interruptions and target data theft or system monitoring over an extended period of time. After that, they usually disappear again unnoticed. Is it possible to detect something that should remain silent and unnoticed? APT hackers and malware are more widespread and sophisticated than ever. For some …

Unmistakable Clues to An APT Attack Read More »

Privacy and data protection on the Internet: Eyes on the VPN choices

Virtual Private Networks – VPNs for short – have experienced a boost with the Corona crisis: Ideally, home office employees should have encrypted and secure access to the corporate network. However, this only works if the VPN provider is trustworthy. VPN connections have great advantages: they disguise data traffic on the Internet and protect against …

Privacy and data protection on the Internet: Eyes on the VPN choices Read More »

P2P Improves Vulnerability Management

P2P Improves Vulnerability Management

Security vulnerabilities are one of the most important gateways for cybercriminals, yet companies often take days or weeks to close them. The reason is usually vulnerability management that offers too little automation and takes up too many network resources – especially with remote work, this is a major problem. Solutions with peer-to-peer (P2P) technology provide …

P2P Improves Vulnerability Management Read More »

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family

Identity and Access Functions Combined Microsoft Introduces Entra Product Family-

In its new Entra product family, Microsoft is focusing on secure access to networked worlds. To this end, Entra includes identity and access management, cloud infrastructure entitlement management, and identity verification. According to a blog post by Joy Chik, corporate vice president of identity at Microsoft, Entra is intended to pursue a new, comprehensive understanding …

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family Read More »

Database Security: Costs, Benefits and Risks of Database Backups

In the modern workplace, data is the lifeblood for businesses and protecting it is correspondingly important. And database backups are one of the common methods database administrators (DBAs) use to ensure the continued availability of data: This involves copying data and schemas from a database and storing them in another location from which they can …

Database Security: Costs, Benefits and Risks of Database Backups Read More »

NRW Data Protection Report: Rebuke for Security Authorities

In her annual report, the new chief data protection officer of the state of North Rhine-Westphalia (NRW) takes on the police and public prosecutors, criticizing data protection breaches. In her new annual report, NRW data protection commissioner Bettina Gayk criticizes police and public prosecutors. For example, in its investigations into suspected right-wing extremist networks within …

NRW Data Protection Report: Rebuke for Security Authorities Read More »

Device Encryption in Windows 10 and 11: How To Do It with All Editions

Device Encryption in Windows 10 and 11 How To Do It with All Editions

Device encryption in Windows 11 can be used as a replacement for Bitlocker and protect Windows notebooks and PCs from data theft for free but effectively. The article shows how to set up this technology. With device encryption in Windows 10/11, PCs and notebooks on which Windows 10/11 Home is installed can also use data …

Device Encryption in Windows 10 and 11: How To Do It with All Editions Read More »

Modern Endpoint Protection Needs the Cloud

Not only home users still believe that endpoint protection consists of anti-malware protection and firewall. Inadequate endpoint protection does not remain hidden from cybercriminals. Many cyberattacks target endpoints and the data and applications on them. The new eBook explains what needs to change in Endpoint Protection. The cyber risks threatening endpoints today are not only …

Modern Endpoint Protection Needs the Cloud Read More »

Cracks in The Ransomware Ecosystem

According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat to businesses worldwide. Cybercrime around ransomware is organized and sophisticated, with technology that has been democratized and made accessible to the point that ransomware has become its own economy. Some ransomware operators are playing a numbers game by targeting MSPs …

Cracks in The Ransomware Ecosystem Read More »

What Is an Overlay Network?

An overlay network is built on top of an existing network and its infrastructure. It interconnects the communication participants and nodes via logical connections. The overlay network provides a logical decoupling from the underlay network and its physical network infrastructure. An overlay network can be used to map virtual network structures and implement missing functionalities …

What Is an Overlay Network? Read More »

The Biggest Data Protection Mistakes in Email Marketing

Email marketing has not lost its relevance even in times of the General Data Protection Regulation. But the GDPR places high demands on advertising sent via mail. The data protection supervisory authorities report on typical mistakes that continue to happen to companies and that have come to the attention of the relevant supervisory authority as …

The Biggest Data Protection Mistakes in Email Marketing Read More »

Radware SecurePath: Protecting Cloud Applications Out-Of-Path

Application delivery and cybersecurity specialist Radware has unveiled SecurePath, a new cloud-based architecture for enhanced application security. It enables lower latency, easier deployment, and higher levels of security, among other benefits. SecurePath is the foundation for Radware’s application-protection-as-a-service solutions. The architecture is designed primarily to provide perspective to enterprises looking for consistent, high-quality, comprehensive application …

Radware SecurePath: Protecting Cloud Applications Out-Of-Path Read More »

PAM alone is not enough!

The need to secure access to organizations’ infrastructures has never been greater. Securing access enables organizations to ensure business continuity, comply with regulatory requirements and, most importantly, make data accessible to all to enable innovation and thus ensure their economic competitiveness. The need for secure access to corporate data has never been greater. With the …

PAM alone is not enough! Read More »

Understanding Microsoft 365 Threat Intelligence and Using It Productively

Understanding Microsoft 365 Threat Intelligence and Using It Productively

With Microsoft 365 Defender and Threat Intelligence, admins of the Microsoft cloud solution can stay on top of the security of users and contained resources and successfully detect, prevent and defend against threats. The article shows the capabilities and features of the security solution. Microsoft 365 Defender is the central entry point when it comes …

Understanding Microsoft 365 Threat Intelligence and Using It Productively Read More »

What is SECAM (Security Assurance Methodology)?

What is SECAM Security Assurance Methodology

Security Assurance Methodology is a framework developed by the 3rd Generation Partnership Project (3GPP) to assure and evaluate the security of network products used in the mobile communications sector. An important partner in the development and implementation of the framework is the GSM Association (GSMA). SECAM provides general, testable security requirements and security properties for …

What is SECAM (Security Assurance Methodology)? Read More »