Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

‘Adobe Acrobat blocks antivirus software’

‘Adobe Acrobat blocks antivirus software’

Security researchers suspect Adobe Acrobat of blocking antivirus software when opening PDFs. This means that most antivirus tools have no way of recognizing malware in PDFs opened by Acrobat. The issue was found by security company Minerva Labs. Its report shows that Adobe Acrobat scans users' d... Read more

date2 years ago
Zscaler launches Posture Control to secure cloud workloads

Zscaler launches Posture Control to secure cloud workloads

Zscaler announced the launch of Posture Control at its Zenith Live conference. The solution is intended to take cloud-native application security to a higher level. It helps DevOps teams prioritize and remediate risks earlier in the development process. Posture Control is tailored to secure clou... Read more

date2 years ago
Zscaler Zero Trust Exchange update blocks advanced threats

Zscaler Zero Trust Exchange update blocks advanced threats

Zscaler is adding artificial intelligence and machine learning to Zero Trust Exchange. The new features should prevent advanced cyber threats from entering an organization. Zscaler shared the news at its Zenith Live conference. According to the organization, the new features are very accurate d... Read more

date2 years ago
HCP Boundary beta available, free VPN alternative

HCP Boundary beta available, free VPN alternative

HashiCorp launched a free beta version of HCP Boundary. The solution allows organizations to secure user access to data and apps. HCP Boundary is comparable to VPN, but more effective for multicloud environments. HCP Boundary is a managed version of Boundary. HashiCorp introduced the open-source... Read more

date2 years ago
Researchers detail Hermit, mobile spyware used by governments

Researchers detail Hermit, mobile spyware used by governments

Security experts from Lookout disclosed new information regarding Android spyware used in targeted assaults by national governments in Kazakhstan, Syria, and Italy. The software, dubbed Hermit by security company Lookout, was initially discovered in Kazakhstan in April, only months after the aut... Read more

date2 years ago
Panchan malware spreads across networks through Linux servers

Panchan malware spreads across networks through Linux servers

The peer-to-peer Panchan malware spreads throughout educational institutes using Linux servers to mine cryptocurrencies. Discovered by Akamai researchers in March, the virus spreads using stolen SSH keys and operates its cryptomining malware in devices' memory. Instead of stealing intellectual p... Read more

date2 years ago
Microsoft introduces Defender platform for consumers

Microsoft introduces Defender platform for consumers

Customers with a Microsoft 365 Personal or Family subscription can now secure multiple devices through Microsoft Defender for Individuals. The app allows Microsoft 365 Personal or Family users to easily view the security status of multiple devices via a central dashboard. Added devices are prot... Read more

date2 years ago
‘Microsoft conceals critical vulnerabilities’

‘Microsoft conceals critical vulnerabilities’

Several security companies are dissatisfied with Microsoft's patch policy. The tech giant allegedly undermines and conceals serious vulnerabilities. Most criticism comes from Orca Security and Tenable, two security researchers. Orca Security informed Microsoft of two serious Azure Synapse Analyt... Read more

date2 years ago
Security industry drains, labour shortages increase

Security industry drains, labour shortages increase

More and more security professionals consider a career switch. Simultaneously, nearly half of all Dutch IT service providers are short on manpower. The trends are evident from separate reports by Deep Instinct and Rabobank. Security firm Deep Instinct spoke with 1,000 senior security profession... Read more

date2 years ago
Microsoft acquires Miburo to combat disinformation

Microsoft acquires Miburo to combat disinformation

Microsoft is acquiring Miburo, an anti-disinformation specialist. The tech giant wants to better combat cyberattacks that use deepfakes and fake news. Miburo specializes in social media research and anti-disinformation. Microsoft will use Miburo's technology to detect and respond disinformation... Read more

date2 years ago
1 116 117 118 119 120 273