Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Cisco warns of highly critical vulnerability in IOS XE software
Cisco is warning of a highly critical authentication vulnerability in its IOS XE software. It allows hackers ...
Researchers foil MitM attack on military robots with algorithm
Australian researchers at UniSA University have succeeded in preventing Man-in-the-Middle (MitM) attacks on a...
Visma to put emphasis on mature security
For Visma, delivering secure business software is an absolute top priority. High standards must ensure data p...
DarkGate malware targets Skype and Microsoft Teams
The so-called DarkGate malware not only attacks Skype accounts but also spreads through affected Microsoft Te...
Vulnerabilities go unnoticed by users of open-source software far too often
Every year, Sonatype takes a good look at the software supply chain. In this year's State of the Software Sup...
Docker locker, Sysdig partnership secures cloud-native apps
Docker and Sysdig have partnered to provide a new layer of real-time cloud-native security strengthening tech...
Cybersecurity experts suffer from a considerable amount of work stress
Cybersecurity experts suffer excessively from work stress and overtime, according to a recent British survey ...
Hack targets Air Europa: customers must block credit cards
Air Europa has been hit by a hacking attack in which customer credit card data has been stolen. The Spanish a...
Microsoft Defender for Endpoint now automatically isolates infected accounts
Microsoft Defender for Endpoint now automatically takes action on suspicious activity. For example, it automa...
MGM hack: ransom wasn’t paid, company found out about hack in time
MGM Resorts International knew about a hack even before the cybercriminals in question demanded a ransom for ...