Security

94 Percent Increase in Attacks on Health Care

Ransomware attacks on healthcare organizations are noticeably on the rise. However, paying the ransom is no guarantee of getting encrypted data back. Hacking attacks on the healthcare industry pose a real threat. This is now confirmed once again by Sophos’ industry analysis, “The State of Ransomware in Healthcare 2022.” According to the report, there has …

94 Percent Increase in Attacks on Health Care Read More »

Unmistakable Clues to An APT Attack

Unmistakable Clues to An APT Attack-

APT hackers avoid verifiable events, error messages, or service interruptions and target data theft or system monitoring over an extended period of time. After that, they usually disappear again unnoticed. Is it possible to detect something that should remain silent and unnoticed? APT hackers and malware are more widespread and sophisticated than ever. For some …

Unmistakable Clues to An APT Attack Read More »

Faster Response to Software Security Vulnerabilities

Faster Response to Software Security Vulnerabilities

JFrog introduces new integrations for JFrog Xray with ServiceNow’s Lightstep Incident Response and Spoke products for IT service management. IT executives will use them to gain real-time visibility into security vulnerabilities and compliance issues. Given the high velocity of today’s business operations, successfully securing the software supply chain requires efficient cross-team collaboration to address security …

Faster Response to Software Security Vulnerabilities Read More »

Sophos Active Adversary Playbook 2022: Criminals Are Hiding in The Corporate Cloud Longer and Longer

Security expert Sophos has found that the average duration of undetected, attackless sneak peeks by cybercriminals on corporate networks has risen to 34 days. Smaller businesses and the education sector were particularly affected, it said. Sophos has published its “Active Adversary Playbook” for 2022. It details the behavior of cybercriminals observed by the “rapid response …

Sophos Active Adversary Playbook 2022: Criminals Are Hiding in The Corporate Cloud Longer and Longer Read More »

Physical Protection – Protect Your Data and Information!

  To ensure successful and sustainable digitization in companies and public authorities, it is not only essential to secure technical and organizational measures relating to IT systems and processes, but also to adequately secure buildings and premises. The BSI’s Management Report 2021 shows that “information security is the prerequisite for successful and sustainable digitization.” BSI …

Physical Protection – Protect Your Data and Information! Read More »

Privacy and data protection on the Internet: Eyes on the VPN choices

Virtual Private Networks – VPNs for short – have experienced a boost with the Corona crisis: Ideally, home office employees should have encrypted and secure access to the corporate network. However, this only works if the VPN provider is trustworthy. VPN connections have great advantages: they disguise data traffic on the Internet and protect against …

Privacy and data protection on the Internet: Eyes on the VPN choices Read More »

XDR Completes Classic Threat Defense

XDR Completes Classic Threat Defense

Conventional security solutions often cannot adequately detect advanced cyber attacks because the attackers remain inconspicuous for a long time and only strike visibly when they have worked with relevant systems. Extended Detection and Response (XDR) solutions help detect intruders early – but they are only effective when used with experienced security analysts. Corona, disrupted supply …

XDR Completes Classic Threat Defense Read More »

P2P Improves Vulnerability Management

P2P Improves Vulnerability Management

Security vulnerabilities are one of the most important gateways for cybercriminals, yet companies often take days or weeks to close them. The reason is usually vulnerability management that offers too little automation and takes up too many network resources – especially with remote work, this is a major problem. Solutions with peer-to-peer (P2P) technology provide …

P2P Improves Vulnerability Management Read More »

Three Measures to Strengthen IT Security and Resilience

Three Measures to Strengthen IT Security and Resilience 1

Since the outbreak of the Ukraine war, states and companies have not only been alarmed by military maneuvers. Concerns about politically motivated cyberattacks are also spreading in the digital space – and there are constant reports of new attacks. Attacks on U.S. utility companies and industrial facilities and Ukrainian energy companies are just two of …

Three Measures to Strengthen IT Security and Resilience Read More »

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family

Identity and Access Functions Combined Microsoft Introduces Entra Product Family-

In its new Entra product family, Microsoft is focusing on secure access to networked worlds. To this end, Entra includes identity and access management, cloud infrastructure entitlement management, and identity verification. According to a blog post by Joy Chik, corporate vice president of identity at Microsoft, Entra is intended to pursue a new, comprehensive understanding …

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family Read More »

Database Security: Costs, Benefits and Risks of Database Backups

In the modern workplace, data is the lifeblood for businesses and protecting it is correspondingly important. And database backups are one of the common methods database administrators (DBAs) use to ensure the continued availability of data: This involves copying data and schemas from a database and storing them in another location from which they can …

Database Security: Costs, Benefits and Risks of Database Backups Read More »