Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly reports on IT security topics as well as on current innovations and events at Hornetsecurity.
Hornetsecurity now offers with the new Hornetsecurity SIEM Connector for its products 365 Total Protection and the Spam Filter Service an interface for the SIEM services. Thanks to the connector, e-mail log entries can be automatically received and imported from the Hornetsecurity Cloud.
You cannot turn on the news without hearing about it, and you cannot show up to work without being warned about it. Ransomware has dominated the public conversation on cyber security, and hackers have spent the year exploiting companies for billions with the tactic. Email has become the number one attack vector, and ransomware has become any employees worst enemy.
Christmas is just around the corner and it is already certain that some people will lose their holiday spirit. When millions of people go online on a gift hunt, the trap snaps shut. We are talking about the new invisible threat on the Internet: Formjacking, also known as e-skimming. Hackers are stealing credit card and bank details from online shops with hijacked payment forms…
On November 7th, Deloitte invited to the Fast 50 Awards ceremony in Hamburg and honoured Germany’s 50 fastest growing technology companies. Once again, Hornetsecurity was delighted to receive the award – for the fifth time.
A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…
In order to offer users the opportunity to familiarize themselves with Hornetsecurity’s services in advance and to make the implementation of the products as easy as possible, the email security specialist expanded its onboarding service with a training program in form of training videos on YouTube.
You could certainly see, hear, feel and understand Hornetsecurity from 8th through 10th of Octo-ber at the it-sa 2019: According to the slogan “I want Cloud” the Email Cloud Security Provider presented an extraordinary program on its 200m² booth and took completely new ways of presenting its new Email Security Services.
Are you aware of your “data value”? In the case of a data leak in the IT systems of multinational companies, it is often reported that the damage amounts to billions. Data has even become one of the most valuable resources in the world. However, a calculator that allows users to determine the overall value of their data leaves a completely different impression: the “price” for the information provided by users is always less than one dollar. But how is this possible and is it even possible to specifically calculate the value of this “resource”?