
Managed Security Services: In demand as never before
by Tina Siering
Phishing, ransomware, data espionage - the list of cyber threats is long. At the same time, cyber criminals are becoming increasingly sophisticated and professional. Consequently, the risk of becoming a victim of a cyberattack continues to increase in Germany and around the world. Small and medium-sized enterprises in particular usually do not have the necessary resources to detect cyberattacks themselves in time and thus be able to defend themselves. The demand for Managed Security Service Providers (MSSP) and their diverse range of services is therefore unabatedly high. We reveal what you should look for when choosing an external service provider.
Read more … Managed Security Services: In demand as never before
Detect anomalous behaviour patterns in the network: Why anomaly early detection is crucial for your IT security
by Svenja Koch
The constantly growing number of cyber attacks makes it clear that an IT security early warning system for the defence against cyber threats is becoming increasingly important. Such a system can be implemented with the help of network monitoring and anomaly detection. However, the basis for an efficient implementation is to ensure the complete control and analysis of the data.
For experts in the field of IT security, the news from the Anhalt-Bitterfeld district comes as no surprise. The district's network was the target of a large-scale cyber attack. Security experts have been warning of such a cyber disaster in Germany for quite some time. You can find out why here!
Read more … Avoidable worst case? First cyber disaster in Germany due to attack on KRITIS
Rising attacks on the manufacturing sector: Why multi-layer cyber defence systems are now becoming indispensable!
by Svenja Koch
While manufacturing companies invest extensively in the necessary digital infrastructure for the IIOT (Industrial Internet of Things), IT security usually falls by the wayside. IT security measures against cyber threats and various cyber attacks are too often still based on outdated security concepts. This article explains why multi-layered cyber defence systems are now indispensable and how threat hunting and active cyber defence can significantly increase IT security in a production company.
It doesn't matter if you have all sorts of security solutions installed - once intruders have penetrated your systems, one or more of these controls will have failed and they will cause damage to your network until you finally detect them. As we know, this can take months. If your goal is to maintain the integrity of your network, Threat Hunting provides the ultimate check that you are secure.
Read more … Why Threat Hunting should become a standard requirement in Cyber Security
The so-called Advanced Persistant Threats (ATP) are creating an increasingly complex threat situation. This massively aggravates the risk situation in companies and makes the defence against threats for cyber security more and more challenging. Successful defence against such cyber threats begins with prevention. For this, it is necessary to understand the attack patterns of the hackers. This is precisely where cyber threat modelling or hunting comes in.
Read more … Cyber Threat Modelling and Cyber Threat Hunting - Think like an attacker!
The use of artificial intelligence (AI) is also playing an increasingly important role in cyber security. Artificial intelligence shows its strengths above all in the early detection of cyber threats or in the real-time monitoring of IT infrastructures. However, uncontrolled use of AI is definitely dangerous! In this article, you will learn what artificial intelligence can do in the area of cyber security and how AI can support cyber threat hunting and threat intelligence.
Read more … Artificial Intelligence in IT Security - Status Quo and Perspectives
With the passed IT Security Act 2.0 (IT-SIG), anomaly detection for CRITIS companies and organisations is enshrined in law. Now it is time for operators of critical infrastructures to act: According to IT-SIG 2.0, they must implement appropriate protective measures to defend against cyber attacks within one year that comply with the current legislation. How can it be done faster?
Read more … IT Security Act 2.0 comes into force: KRITIS companies must ensure anomaly detection
FAQ Cyber Threat Hunting: 10 most frequently asked questions about proactively hunting cyber threats!
by Svenja Koch
You are still new to the topic of Cyber Threat Hunting and have many questions that you would like to have answered by a real expert? No one can do this better than a long-standing expert from the Cyber Threat Hunting scene, which originated in the USA: Chris Brenton from Active Countermeasures INC, our partner for Active Cyber Defense, answers the 10 most frequently asked questions about threat hunting in today's blog post.
The top 5 threat actors in cyberspace - and what IT security measures you can take to protect yourself from them
by Svenja Koch
Ransomware and Advanced Persistent Threats are challenging IT security - and cyberattacks are increasing not only in scope but also in professionalism as technology continues to advance. We present the five most relevant threat actors in the field of cyber threats - and provide tangible tips on which IT security strategies you can use to protect your network most reliably.