Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Sophos introduces ZTNA for secure user and device connections

Sophos introduces ZTNA for secure user and device connections

Sophos is introducing a Zero Trust Network Access (ZTNA) portfolio. Zero trust principles and far-reaching integration with Sophos Intercept X's endpoint security are key to the release. With the arrival of Zero Trust Network Access (ZTNA), Sophos wants to offer a transparent and scalable securi... Read more

date2 years ago
Critical Linux vulnerability affects all major distributions

Critical Linux vulnerability affects all major distributions

Security researchers have found vulnerabilities in Linux PolicyKit (also known as Polkit). The vulnerabilities allow hackers to gain complete access to affected machines and upload malicious code. The issue has since been patched. According to Qualys researchers, the so-called PwnKit exploit man... Read more

date2 years ago
Log4J hackers continue targeting VMware Horizon servers

Log4J hackers continue targeting VMware Horizon servers

VMware is rushing to convince customers to apply the latest security guidance. According to several cybersecurity companies monitoring the situation, attackers are still targeting VMware Horizon servers through Log4J vulnerabilities.  Two weeks ago, the UK's National Health Service (NHS)... Read more

date2 years ago
Deloitte chooses Exabeam for XDR/SIEM capabilities in MXDR

Deloitte chooses Exabeam for XDR/SIEM capabilities in MXDR

Deloitte has chosen Exabeam for their XDR and SIEM capabilities of their new MXDR offering, which we reported on on more detail yesterday. Exabeam details why Deloitte chose them in a separate release. Deloitte launched the MXDR suite earlier this week. It consists of the offerings of Zscaler, S... Read more

date2 years ago
Google launches anti-phishing alerts in Google Drive

Google launches anti-phishing alerts in Google Drive

Google will now warn of phishing, malware and ransomware when opening files in Google Drive. Google Drive integrates with numerous apps to open files in the cloud. Think of Google Docs for .docx's, Adobe Acrobat for .pdf's and Music Player for .mp3's. Although downloading a file has triggered a ... Read more

date2 years ago
Deloitte launches Managed Extended Detect and Response platform

Deloitte launches Managed Extended Detect and Response platform

Deloitte has finally launched its latest threat detection and response platform, MXDR (Managed Extended Detect and Response). This SaaS platform is designed for "human-powered, flexible, technology-enabled security operations." Essentially, clients will receive a "composable, unified, integrated... Read more

date2 years ago
Data of half a million people at risk in hack on Red Cross

Data of half a million people at risk in hack on Red Cross

An enormous hack has hit the International Committee of the Red Cross (ICRC). The personal data of as many as 515,000 people has been stolen. The perpetrator of the attack is unknown at this time. According to the IRCR, the hackers managed to steal personal information from databases of at least... Read more

date2 years ago
Zoom was vulnerable to buffer overflows and memory leaks

Zoom was vulnerable to buffer overflows and memory leaks

Project Zero found two vulnerabilities in Zoom, which have since been patched. Clients of users were found to be susceptible to buffer overflows. Data from central Zoom servers was successfully leaked from outside the network. The vulnerabilities were found by Natalie Silvanovich, a security res... Read more

date2 years ago
1 142 143 144 145 146 273