Category: Security

Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), and in September, the IT Security Incident Response Center (CERT-INT) within the Ministry of Internal Affairs announced the identification […]

Read more ›
Eliminating Security Complexity is Key to Reducing Enterprise Risk

Eliminating Security Complexity is Key to Reducing Enterprise Risk

Symantec Enterprise Cloud: a single security solution for the most demanding organizations We always move towards simplification, but the world has a way of moving back.  While allowing employees to work anywhere simplified things for them, it increased the security risk.  Moving to the cloud brings many benefits, it also brings management and compliance complexity. And going all in on […]

Read more ›
ENISA study: Public sector most at risk

ENISA study: Public sector most at risk

In the 10th edition of its ENISA Threat Landscape (ETL), the EU’s cybersecurity agency explicitly warns of increasing threats from hacking attacks on public sector entities. Around a quarter of all security related incidents target administrative or government entities, the ENISA study reports – making the public sector nearly twice as much at risk as hosters and providers, who come […]

Read more ›
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Symantec, by Broadcom Software, was able to link this activity to a group we track as Billbug due to the use in this campaign of tools previously attributed to this group. Billbug (aka Lotus Blossom, Thrip) is a long-established advanced persistent threat (APT) group that is believed to have been active since at least 2009. Symantec has previously published on […]

Read more ›
5 Steps to Better Protect Your Data

5 Steps to Better Protect Your Data

How to Build an Effective Data Security Strategy Five steps towards full visibility and control across your organization It’s no longer business as usual for cybersecurity Dramatically accelerated by the pandemic, your move to the cloud has fundamentally altered your organization’s relationship with users, apps, and data and how they interact with each other. In terms of productivity, this has […]

Read more ›
Not if, but when: in the face of increasing cyber risks, businesses must have a strong safety net

Not if, but when: in the face of increasing cyber risks, businesses must have a strong safety net

Mazars, the international audit, tax and advisory firm, has released its cyber security report: is your safety net strong enough? According to research amongst more than 1,000 C-suite executives worldwide, cyber security is now a major preoccupation among corporate leaders. Effective cyber defence has become a delicate balancing act for many businesses; having a strong safety net that can cushion […]

Read more ›
Kaspersky and the GEIGER project: IT security for small and micro enterprises requires training

Kaspersky and the GEIGER project: IT security for small and micro enterprises requires training

Nowadays, digitalisation affects all types of companies, even small ones, and this exposes them to cyber incidents, that can have major consequences in both economic and reputational aspects. Kaspersky has always been sensitive to their security, and thanks to its participation in GEIGER, a project co-funded by the European Commission, it has enhanced its two gamification solutions, which are now […]

Read more ›
Veeam Research Finds Organizations are Increasing Modern Data Protection for Cloud Workloads to Reduce Cyber Security Risks

Veeam Research Finds Organizations are Increasing Modern Data Protection for Cloud Workloads to Reduce Cyber Security Risks

Veeam® Software, the leader in Modern Data Protection, today released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery as a Service (BaaS/DRaaS). The survey found that companies are recognizing the increasing […]

Read more ›
Breaking the myths of Zero Trust model  and understanding how it can protect your organization

Breaking the myths of Zero Trust model and understanding how it can protect your organization

One of the latest buzzwords in the cyber security industry is a ‘Zero Trust’ security model. In short, a zero-trust model basically means you do not leave any room for errors at all and do not trust anyone or anything.   Owing to a hybrid workplace led by the after-effects of the pandemic and several emerging technologies such as the […]

Read more ›
Veeam Positioned as a Leader in the 2022 Gartner®  Magic Quadrant for Enterprise Backup and Recovery Software Solutions for the Sixth Consecutive Time

Veeam Positioned as a Leader in the 2022 Gartner® Magic Quadrant for Enterprise Backup and Recovery Software Solutions for the Sixth Consecutive Time

Veeam® Software, the leader in backup, recovery and data management solutions that deliver Modern Data Protection, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it […]

Read more ›
Qualys Introduces Zero-Touch Patching for Proactive Vulnerability Remediation

Qualys Introduces Zero-Touch Patching for Proactive Vulnerability Remediation

Qualys, a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced it is integrating zero-touch patching capabilities into Qualys Patch Management. Zero-Touch Patch ensures that companies’ endpoints and servers are proactively updated as soon as patches are available, reducing their overall attack surface. Most vulnerability remediation involves multiple teams and processes – first, a scanning […]

Read more ›
New palmvein scanner from iCOGNIZE

New palmvein scanner from iCOGNIZE

The Hessian company iCOGNIZE is launching the ScanVein Compact (SVC) this month – a new palm vein scanner for biometric authentication. It can be used to effectively secure any access areas in companies. Access control of the future With the ScanVein Compact, iCOGNIZE is ushering in a new era in product development: The new 2CON transmission technology has already been […]

Read more ›