Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Deloitte chooses Exabeam for XDR/SIEM capabilities in MXDR

Deloitte chooses Exabeam for XDR/SIEM capabilities in MXDR

Deloitte has chosen Exabeam for their XDR and SIEM capabilities of their new MXDR offering, which we reported on on more detail yesterday. Exabeam details why Deloitte chose them in a separate release. Deloitte launched the MXDR suite earlier this week. It consists of the offerings of Zscaler, S... Read more

date2 years ago
Google launches anti-phishing alerts in Google Drive

Google launches anti-phishing alerts in Google Drive

Google will now warn of phishing, malware and ransomware when opening files in Google Drive. Google Drive integrates with numerous apps to open files in the cloud. Think of Google Docs for .docx's, Adobe Acrobat for .pdf's and Music Player for .mp3's. Although downloading a file has triggered a ... Read more

date2 years ago
Deloitte launches Managed Extended Detect and Response platform

Deloitte launches Managed Extended Detect and Response platform

Deloitte has finally launched its latest threat detection and response platform, MXDR (Managed Extended Detect and Response). This SaaS platform is designed for "human-powered, flexible, technology-enabled security operations." Essentially, clients will receive a "composable, unified, integrated... Read more

date2 years ago
Data of half a million people at risk in hack on Red Cross

Data of half a million people at risk in hack on Red Cross

An enormous hack has hit the International Committee of the Red Cross (ICRC). The personal data of as many as 515,000 people has been stolen. The perpetrator of the attack is unknown at this time. According to the IRCR, the hackers managed to steal personal information from databases of at least... Read more

date2 years ago
Zoom was vulnerable to buffer overflows and memory leaks

Zoom was vulnerable to buffer overflows and memory leaks

Project Zero found two vulnerabilities in Zoom, which have since been patched. Clients of users were found to be susceptible to buffer overflows. Data from central Zoom servers was successfully leaked from outside the network. The vulnerabilities were found by Natalie Silvanovich, a security res... Read more

date2 years ago
‘Automation and DevSecOps ensure the fastest cloud migrations’

‘Automation and DevSecOps ensure the fastest cloud migrations’

In the past year, cloud adoption has grown by 25 percent. Nearly three-quarters of IT organizations run the majority of their workloads in the cloud. The fastest growers are embracing DevSecOps and security automation. That's what Palo Alto Networks concludes in a recent survey. Annually, Palo A... Read more

date2 years ago
Researchers Bypass MFA system Protecting Box Accounts

Researchers Bypass MFA system Protecting Box Accounts

Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification. Cybersecurity researchers this week revealed details of a bug in Box's multi-factor authentication (MFA) mechanism. Malicious actors could exploit the fa... Read more

date2 years ago
1 147 148 149 150 151 278