Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

‘Data breach costs are rising’

‘Data breach costs are rising’

Data breaches have increasingly high costs, according to IBM Security experts in an annual study. Organizations often pass on costs to customers. Big Blue's 2022 Cost of a Data Breach Report states that 83 percent of respondents experienced one or more data breaches in the past year. Affected c... Read more

date2 years ago
AWS anchors security even more firmly in cloud infrastructure

AWS anchors security even more firmly in cloud infrastructure

New services such as Amazon Detective for EKS and AWS GuardDuty for Malware Protection should make the AWS cloud environment much safer. This week AWS updates the world and us on the developments in the field of cloud security and related topics. It does this at the annual re:Inforce conference.... Read more

date2 years ago
Spot Security tries to simplify cloud security

Spot Security tries to simplify cloud security

Spot Security is generally available. The solution maps a cloud environment, recognizes misconfigurations and lists the most important vulnerabilities. Public clouds are growing. According to a recent Forrester report, nine out of ten European companies use multiple public cloud environments. V... Read more

date2 years ago
Snyk goes all out on cloud security with Snyk Cloud

Snyk goes all out on cloud security with Snyk Cloud

Snyk launches Snyk Cloud. The solution automatically adjusts container and infrastructure configurations to comply with security frameworks and policies. Snyk is no stranger to cloud security. Its current offering consists of Snyk Infrastructure as Code (IaS) and Snyk Container. Snyk IaS advises... Read more

date2 years ago
LockBit claims ransomware attack on Italian tax authority

LockBit claims ransomware attack on Italian tax authority

Ransomware group LockBit claims to hold 78GB of private information on Italian companies. According to the cybercriminals, the data was stolen in a cyberattack on the Italian tax authority. The IT partner of the tax authority investigated the claim. On Monday 25 July, a spokesperson told Bloombe... Read more

date2 years ago
New macOS malware uses public cloud storage as control server

New macOS malware uses public cloud storage as control server

Security researchers warn macOS users of a newly discovered malware variant that steals sensitive data from vulnerable Macs via an undocumented backdoor. The malware uses public cloud storage like Yandex Disk and Dropbox as its command and control (C2) channel to steal data such as keystrokes an... Read more

date2 years ago
JavaScript apps are vulnerable to ‘prototype pollution’

JavaScript apps are vulnerable to ‘prototype pollution’

Common code constructs in JavaScript may be exploitable to achieve remote code execution This week The Register reported on new findings by a group of researchers that found a critical command injection vulnerability in Parse Server, an open-source backend for Node.js environments. Rated 10 o... Read more

date2 years ago
Cybercriminals use Windows calculator as malware dropper

Cybercriminals use Windows calculator as malware dropper

Cybercriminals abuse the Windows 7 calculator to quietly execute malware dropper Qbot. Security researcher ProxyLife discovered the method during an analysis of QBot, a malware dropper. Droppers open the door for ransomware attacks. Cybercriminals need a silent way to exchange data with a targe... Read more

date2 years ago
Atlassian Confluence’s default password circulates on Twitter

Atlassian Confluence’s default password circulates on Twitter

The default password of Atlassian Confluence accounts circulates on Twitter. The password makes it possible to access the internal data of Confluence users. Atlassian Confluence is a content management solution. Organizations use the software to write and share internal project information in a ... Read more

date2 years ago
1 114 115 116 117 118 277