Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

How do the RagnarLocker cybercriminals operate?

How do the RagnarLocker cybercriminals operate?

Israeli cybersecurity company Sygnia has set its sights on RagnarLocker, a group of ransomware criminals. Using a hodgepodge of self-developed tools and commercial software, the hackers look to penetrate organisational networks, encrypt important data and demand a crypto ransom from their victims. ... Read more

date1 year ago
CrowdStrike introduces protection for xIoT devices

CrowdStrike introduces protection for xIoT devices

CrowdStrike announced this morning that it is expanding its CrowdStrike Falcon platform. The expansion includes the first solution to provide EDR/XDR protection for xIoT (extended Internet-of-Things) devices. CrowdStrike responds to the digital transformation that is currently affecting many ind... Read more

date1 year ago
Netskope launches faster, more secure software service

Netskope launches faster, more secure software service

Netskope is integrating its offerings with a new software service. Netskope Endpoint SD-WAN combines two techniques of cloud and network architecture. In this way, legacy problems should be solved. The company says the service will become available later this year. Users deploy Netskope's Secure... Read more

date1 year ago
Small number of security vulnerabilities pose biggest threat

Small number of security vulnerabilities pose biggest threat

Three-quarters of security vulnerabilities pose hardly any risk. The real danger comes from a very small number of vulnerabilities, especially those where attack paths converge at points leading to important business assets. This is stated by security vendor XM Cyber in a recent survey. XM Cybe... Read more

date1 year ago
Apple releases latest security patches for older devices

Apple releases latest security patches for older devices

Last week's security updates are now available for older iPhones, iPads, and Macs. This week Apple released iOS and iPadOS 15.7.5, macOS Monterey 12.6.5, and macOS Big Sur 11.7.6 to patch two security vulnerabilities in older devices that are still receiving software updates but aren’t capable... Read more

date1 year ago
Hard action against illegal Cobalt Strike providers

Hard action against illegal Cobalt Strike providers

Microsoft, Fortra and the non-profit organization Health-ISAC are jointly cracking down on providers of illegal Cobalt Strike copies. This is to prevent more abuse of the legal tool. The tech companies and the U.S. nonprofit have permission from a U.S. judge for the action. The goal of the actio... Read more

date1 year ago
Ransomware gang wants $4 Million from MSI for data theft

Ransomware gang wants $4 Million from MSI for data theft

Taiwanese hardware giant is being extorted by a gang who claims to have stolen their source code. A newly formed ransomware gang is demanding a giant payment from MSI after claiming to have stolen a bonanza of data, reports BleepingComputer. The gang calling themselves "Money Message" is new ... Read more

date1 year ago
Security pros are often pressured not to disclose data breaches

Security pros are often pressured not to disclose data breaches

A new study finds that nearly half of security practitioners are being told to ‘keep data breaches under wraps’. A new study published this week shows almost half of cyber security professionals are pressured to keep data breaches secret, according to ITPro. The survey of 400 IT and secur... Read more

date1 year ago
Back-ups should be part of a modern layered security approach

Back-ups should be part of a modern layered security approach

Rubrik has recently been increasingly asserting itself as a security vendor. The announcement in late 2022 of Cyber Recovery seemed like a good reason to talk to Anneka Gupta, Rubrik's Chief Product Officer. What can we expect from Rubrik and more generally from backups in terms of security? Wit... Read more

date1 year ago
1 68 69 70 71 72 278