Category: Security

Increase your data security with Phriendly Phishing and Safetech

Increase your data security with Phriendly Phishing and Safetech

Phishing has been, for several years in a row, one of the main threats to the security of companies. It has become a regular presence in everyone’s daily life, and many organizations tend to overlook it, which is a costly mistake. Statistics show that the number of threats of this type is constantly increasing. According to the Anti-Phishing Working Group […]

Read more ›
New Veeam Research Finds 93% of Cyber Attacks Target Backup Storage to Force Ransom Payment

New Veeam Research Finds 93% of Cyber Attacks Target Backup Storage to Force Ransom Payment

Organizations of all sizes are increasingly falling victim to ransomware attacks and inadequately protecting against this rising cyberthreat. According to new data in the Veeam® 2023 Ransomware Trends Report, one in seven organizations will see almost all (>80%) data affected as a result of a ransomware attack – pointing to a significant gap in protection. Veeam Software, the leader in […]

Read more ›
Uncompromising security in operational environments with Microsoft Defender for IoT and Safetech Innovations

Uncompromising security in operational environments with Microsoft Defender for IoT and Safetech Innovations

The convergence of IT and operational infrastructures forces companies to find the appropriate protection solutions. Microsoft Defender for IoT improves the security of OT environments by ensuring asset management, threat identification and removal, and a proactive approach by detecting vulnerabilities that can be exploited by attackers. Protecting operational networks has become a necessity in the context of accelerated digitization of […]

Read more ›
Eviden took part in largest  NATO international cybersecurity exercise

Eviden took part in largest NATO international cybersecurity exercise

Eviden, the Atos business leading in digital, cloud, big data and security, announces that 3 of its cybersecurity experts based in Romania took part in the largest international cyber defense exercise, ”Locked Shields 2023”, organized by the NATO Cooperative Cyber Defense Center of Excellence (CCDCOE). The exercise took place in Tallinn, Estonia, at the end of April. It brought together […]

Read more ›
Cynet 360, an XDR platform that automates security measures across the organization

Cynet 360, an XDR platform that automates security measures across the organization

Cynet 360 AutoXDR is the first stand-alone cyberthreat protection platform that integrates endpoint, cloud, network and application attack prevention and detection with automated investigation and remediation capabilities. The platform provides security departments with a single point of visibility and multiple incident analysis and investigation options. Available in the Safetech portfolio, both as an individual product and as a service managed […]

Read more ›
90% of organizations reported at least one cyber incident or breach last year

90% of organizations reported at least one cyber incident or breach last year

Nine out of ten organizations (91%) reported at least one cyber incident or breach last year, according to Deloitte 2023 Global Future of Cyber Survey, and more than a third (38%) between six and ten events. The study also points out that the frequency of cyber incidents varies depending on the level of cyber maturity of the organization, more low […]

Read more ›
More Docker compliance tests in Greenbones Vulnerability Management

More Docker compliance tests in Greenbones Vulnerability Management

For almost two years, Greenbone has been adding more and more tests from the recommendations of the Center for Internet Security (CIS) in its security feed. Among the newest ones are benchmarks for the container management solution Docker. Docker is one of the most common container technologies in enterprise environments. Its increasing popularity within DevOps circles, ease-of-use and flexibility made […]

Read more ›
Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), and in September, the IT Security Incident Response Center (CERT-INT) within the Ministry of Internal Affairs announced the identification […]

Read more ›
Eliminating Security Complexity is Key to Reducing Enterprise Risk

Eliminating Security Complexity is Key to Reducing Enterprise Risk

Symantec Enterprise Cloud: a single security solution for the most demanding organizations We always move towards simplification, but the world has a way of moving back.  While allowing employees to work anywhere simplified things for them, it increased the security risk.  Moving to the cloud brings many benefits, it also brings management and compliance complexity. And going all in on […]

Read more ›
ENISA study: Public sector most at risk

ENISA study: Public sector most at risk

In the 10th edition of its ENISA Threat Landscape (ETL), the EU’s cybersecurity agency explicitly warns of increasing threats from hacking attacks on public sector entities. Around a quarter of all security related incidents target administrative or government entities, the ENISA study reports – making the public sector nearly twice as much at risk as hosters and providers, who come […]

Read more ›
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Symantec, by Broadcom Software, was able to link this activity to a group we track as Billbug due to the use in this campaign of tools previously attributed to this group. Billbug (aka Lotus Blossom, Thrip) is a long-established advanced persistent threat (APT) group that is believed to have been active since at least 2009. Symantec has previously published on […]

Read more ›
5 Steps to Better Protect Your Data

5 Steps to Better Protect Your Data

How to Build an Effective Data Security Strategy Five steps towards full visibility and control across your organization It’s no longer business as usual for cybersecurity Dramatically accelerated by the pandemic, your move to the cloud has fundamentally altered your organization’s relationship with users, apps, and data and how they interact with each other. In terms of productivity, this has […]

Read more ›