Stories about Sicherheitstechnologie
- 2more
- 2
Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals
more - 3
EU Directive NIS 2 in Force: Companies Under Pressure on Cybersecurity
more EU Cyber Resilience Regulation could mean Millions in Fines for Manufacturers, Distributors and Importers
EU Cyber Resilience Regulation could mean Millions in Fines for Manufacturers, Distributors and Importers IoT-Security provider ONEKEY offers quick compliance check for Cyber Resilience Act readiness Düsseldorf/Germany, January 18, 2023 – The EU Commission's Cyber Resilience Act (CRA) is intended to close the ...
moreONEKEY: New Release of Cybersecurity Software finds the most dangerous IoT Vulnerabilities
ONEKEY: New Release of Cybersecurity Software finds the most dangerous IoT Vulnerabilities Upgrading in the war against cybercriminals with expanded protection from zero-day attacks Düsseldorf/Germany, December 8, 2022 – ONEKEY, a company specializing in the security of industrial control systems and IoT devices, is responding to the increasing activity of criminal ...
moreImporters and distributors are considered manufacturers: EU Cyber Resilience Act raises stakes
Importers and distributors are considered manufacturers: EU Cyber Resilience Act raises stakes OEM products become a cyber risk for chain stores, buying cooperatives and many more Düsseldorf/Germany, October 24, 2022 – The Cyber Resilience Act aims to close gaps in cybersecurity across the entire supply chain of products and protect consumers and companies from ...
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Document protection with colorful barcode / Simple forgery protection for paper documents and PDFs – automated tamper control via app
moreEU Cyber Resilience Act becomes a Tour de Force for the Industry
EU Cyber Resilience Act becomes a Tour de Force for the Industry Time-to-market becomes a gamble without automated analysis routines Düsseldorf/Germany, October 10, 2022 – All products with digital elements – from routers to smart refrigerators to televisions and, above all, any modern industrial equipment – should no longer pose cyber risks to users in the future. This is what the EU Commission is demanding, and ...
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Mechanism for Internet security broken
moreONEKEY announces automated detection of zero-day vulnerabilities
ONEKEY announces automated detection of zero-day vulnerabilities New platform for automated discovery of unknown 0-day vulnerabilities for producers of connected devices and operators of industrial control systems Düsseldorf/Germany, September 29, 2022 – For the first time, European IoT/OT security specialist ONEKEY is enabling software-based automated detection of ...
moreExperts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products
Experts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products New expert whitepaper on managing risks in the software supply chain using IEC 62443 and automated software BOMs now available! Düsseldorf/Germany, September 7, 2022 – With a new cybersecurity agenda, the German government wants to improve the security of industrial ...
moreONEKEY redefines IoT Security with UNBLOB
ONEKEY redefines IoT Security with UNBLOB ONEKEY open sources its high-performance firmware extraction suite Düsseldorf/Germany, August 4, 2022 – With the open-source release of the new binary extraction suite "UNBLOB", ONEKEY provides a core component of its automated firmware security analysis platform to the infosec community. This will set a new milestone in the battle to raise security to a new level in the field ...
moreCybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON
Cybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON IoT security specialist ONEKEY presents new technology and tools at the two most important IT security conferences in 2022 Düsseldorf/Germany, July 18, 2022 – The two tech conferences Black Hat and DEF CON are considered the unofficial nerve center of global IT security. German companies are rather rarely allowed to present at these two events. This ...
moreStudy uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS
Study uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS IoT security report 2022 reveals significant gaps in cybersecurity Düsseldorf/Germany, July 6, 2022 – Cybersecurity is still thought of in silos – that is the conclusion of a study by IoT security specialist ONEKEY. "In many cases, companies and entrepreneurs still think in ...
moreDriveLock Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022
Munich, Germany (ots) - DriveLock Wins in the Cutting Edge in Endpoint Security categoryat 10th Annual Global InfoSec Awards at #RSAC 2022. DriveLock is proud to announce we have won the following award(s) from CyberDefenseMagazine(CDM),theindustry’sleadingelectronicinformationsecuritymagazine: DriveLock SE has won the Cutting Edge in Endpoint Security award in the ...
moreIT study reveals glaring vulnerabilities: Industry must protect IoT controls
IT study reveals glaring vulnerabilities: Industry must protect IoT controls Industrial systems are moving into hackers' focus worldwide and pose enormous risks Düsseldorf/Germany, June 2, 2022 – With the increasing use of intelligent machines integrated into an entire manufacturing network, the risk of hacker attacks is rising enormously. An IT study reveals that ...
moreIoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance
IoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance New name underlines expanded focus for industry (IIoT), manufacturing (OT) and Internet of Things (IoT) Düsseldorf/Germany, May 3, 2022 – German IT security company IoT Inspector is giving itself a new name. The specialist team for automated analysis of IoT devices ...
moreComodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to Enterprises in the Middle East, Africa and the Eastern European Region
Bloomfield, NJ (ots) - --News Direct-- Comodo Security Solutions, a leading provider of endpoint protection, today announced that they have partnered withDistilogix Distribution to boost presence and better support enterprise customers in the Middle East, Africa, and the Eastern European region. Both companies are ...
moreNew OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices
New OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices Widely popular OpenSSL software for data encryption urgently needs to be updated Düsseldorf/Germany, March 17, 2022 – A new security vulnerability threatens all systems that use OpenSSL, one of the most ...
moreHackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers
Hackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers - IoT Inspector and CHIP examine devices from AVM, Asus, Netgear, and more - New German coalition announces manufacturer liability for damages caused by IT security vulnerabilities Bad Homburg/Germany, December 2, 2021 - Nine Wi-Fi routers from well-known manufacturers recently ...
moreExtended EU RED Directive enforces higher IoT security by 2024
Extended EU RED directive enforces higher IoT security by 2024 80 percent of cyberattacks are directed against wireless devices Bad Homburg/Germany, November 9th, 2021 – The Internet of Things, i.e. especially all wireless smart devices, poses one of the greatest risks in information technology. By introducing new security requirements, the EU Commission is now significantly raising the bar for manufacturers and ...
moreJan C. Wendenburg appointed new CEO of IT security specialist IoT Inspector
moreSevere SDK vulnerabilities at Broadcom due to copy-paste engineering
Severe SDK vulnerabilities at Broadcom due to copy-paste engineering - Cisco small business routers and other well-known manufacturers affected - Vulnerabilities discovered as early as 2011, yet still resurface Bad Homburg/Germany, October 7th, 2021– Hardware components from Broadcom can be found in numerous devices from leading vendors such as Cisco, DD-WRT or ...
moreCritical security vulnerabilities in Realtek chips affect more than 65 hardware manufacturers
moreseca and Imprivata focus on more security and standardization in user authentication
moreFYEO Launches Publicly, Acquires Threat Intelligence Firm Intelliagg, Forms Advisory Board
NEW YORK (ots) - --News Direct-- FYEO Inc., a threat monitoring and identity access management platform, today announced its exit from stealth mode with its first B2B product offering, FYEO Domain Intelligence (“FYEO DI”), and the acquisition of threat intelligence firm Intelliagg. Incubated by enterprise technology and cybersecurity consultancy BTblock, FYEO has ...
moreCyvatar Raises an Additional $9 Million in Series A Round
more- 2
Southeast Asia eCommerce platform Lazada launches public bug bounty program with YesWeHack
more DriveLock received Common Criteria EAL 3+ certification
Munich, Germany (ots) - DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish CSEC authority. The Evaluation Assurance Level 3+ certification, based on a specified set of configurations, attests to the high trustworthiness of DriveLock Agent 2019.2. The certification is recognized by the German Federal Office for Information Technology BSI, as well ...
moreAcronis Unites with Industry Leaders to Publish the First Unified Cybersecurity Guide for Boards of Directors
SCHAFFHAUSEN, Switzerland (ots) - Acronis, a global leader in cyber protection and a member of the World Economic Forum (WEF) Centre for Cybersecurity, shared the results of a new report released by the WEF that warns that cybersecurity failure is a “clear and present danger” and critical global threat, yet ...
more