After a network intrusion, it usually takes cybercriminals eleven days to capture or encrypt data, warns Wolfgang Kurz of indevis.
Eastern Europe
Manufacturing Industry Wants to Improve Customer Experience
Rising operating costs are by far the biggest threat to the business success of transformation projects.
A Technological Review of the Year 2022
With 2022 drawing to a close, we take a look back at how the technologies that generated the greatest expectations before the start of the year have evolved and some of the events that have taken place this year.
The Most Popular German Password 2022 is: 123456
The Hasso Plattner Institute (HPI) has been warning about the risks of weak passwords for years, and every year it produces a ranking of the most commonly used passwords.
Dynatrace Expands its Grail Technology
Dynatrace's Grail-powered platform is now capable of capturing and analyzing business data while preserving multi-cloud context.
Digital Office for Brewers
In Poland, Heineken offers employees a modern working environment that will serve as a blueprint for other locations.
Hillstone Networks Updates its CloudHive Protection Platform
CloudHive 2.9 advances malicious file detection, policy generation and backup.
DocuSign’s Revenues Grow by 18%
In the third quarter of its fiscal year 2023, DocuSign earned more than $645 million, primarily from subscriptions.
73% of Businesses Require Data to be Processed Locally
Ensuring that data remains within a given country or region is an effective risk management strategy.
Trends Episode 8: Security by Design and Deepfakes
Hybrid work models will become the gateway for criminals to enter corporate networks.
Trends Episode 7: Even Attackers Make Mistakes
2023 is a good year to start a cybercrime career. Internet marketplaces offer stolen credentials and ready-made ransomware.
Fitness App Against Stress and for Lower Risk of Disease
The end of the year marks also the time for good resolutions for the next year. Tips for a healthier 2023 from guest author Alexander Kuttig.
DDoS: from hacktivism to professional skilled attacks
DDoS attacks by hacktivists were very notable in the first two quarters of the year, but in the third quarter they have all but disappeared, giving way to skilled professional attacks.
7 out of 10 Companies Fall Victims to Attacks Using Encrypted Traffic
45% of organizations surveyed by Vectra AI have faced this threat multiple times.
Survey: How Business Will Invest in Digital Technology by 2025
Top 3 goals for increased investment: Process automation, artificial intelligence and cloud platforms.
Chat Apps Dominate Customer Communication
Interactions via WhatsApp and RCS are rising significantly, but so are tried-and-tested channels such as SMS and e-mail with increasing interaction processes.
Security Market for 5G Networks Slowing Down
The market is not showing as much interest in 5G as it did at the time of the 4G rollout.
HDD Data Centres can also benefit from Liquid Cooling
With the application of liquid cooling, the energy required for cooling has accounted for only 5 % of the total energy used.
Wipro Launches Expanded Consulting Offering In Europe
Recent consulting acquisitions enable end-to-end cybersecurity solution for enterprises.
Zummo Leans on Sothis CRM
The company Zummo has relied on Sothis to solve its CRM problems by implementing Microsoft Dynamics 365 Sales.
Helixa Summit Begins, a Congress that dives into the Multiverse
In addition to the exhibition of papers on the new socio-technological economy and the presentation of awards for innovative projects, this event will host the presentation of the study "They call me Metaverse".
Successful Outsourcing: These Factors Make the Difference
Demand is on the rise: More and more companies want to outsource, but almost every second venture fails, warns Jürgen Thom of Snubes in a guest article.
Ordering Food Via AI Voice Chatbot
In the hospitality industry, artificial intelligence with intelligent speech recognition function is used for the first time.
ISACA: “Digital Trust is an Attitude, a Trust in Information Systems”.
We interviewed Ramsés Gallego, international chief technology officer at CyberRes, who explains what ISACA's Digital Trust ecosystem is like.
Fake VPN App Spies on Android Users
SET researchers track down eight versions of the malicious app. Malicious apps read contacts, SMS, recorded phone calls and chat messages.
BNPL: Boosting Commerce in an Inflationary Environment
Amazon, Apple, and AliExpress have started to offer 'Buy now, pay later' (BNPL) solutions to their customers, allowing them to defer payment for their purchases. What does this formula consist of and what advantages does it offer?
Linux Foundation Europe Launches its First Project: Sylva
Its aim is to boost network cloudification in line with the European Union's security and energy efficiency guidelines.
Microsoft: Hackers Bypass Multi-Factor Authentication with Stolen Tokens
The technical requirements for these attacks are not very high, according to Microsoft. A danger also comes from "pass-the-cookie" attacks.
Twitter Restricts Two-Factor Authentication
New owner Elon Musk lets "superfluous" microservices shut down. As a result, SMS-based two-factor authentication no longer works.