Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

‘Lack of standards and policies threaten API security’

‘Lack of standards and policies threaten API security’

Researchers from Enable U indicate that a lack of standards, uniform policies and security awareness among employees threaten the API security of IT environments. There's plenty of room for improvement, the organization concluded in a recent research report. APIs are the building blocks that en... Read more

date1 year ago
Mandiant Threat Intelligence integrates with SentinelOne XDR

Mandiant Threat Intelligence integrates with SentinelOne XDR

SentinelOne launched an integration of Mandiant Threat Intelligence and Singularity XDR. The integration allows Mandiant to stream threat intelligence to SentinelOne's XDR platform, providing security professionals with additional information on vulnerabilities and threats. SentinelOne develops ... Read more

date1 year ago
HP Wolf Security provides endpoint protection with secure access

HP Wolf Security provides endpoint protection with secure access

HP has expanded its Wolf Security endpoint security portfolio Sure Access Enterprise (SAE). The solution helps tightly secure access rights to sensitive data, systems and applications using dedicated VMs. The new security solution should protect both compromised and uncompromised endpoints from ... Read more

date2 years ago
ID-ware hack hits thousands of university students and employees

ID-ware hack hits thousands of university students and employees

The personal data of tens of thousands of Eindhoven University of Technology students and employees were captured in a recent ransomware attack on the Dutch branch of German smart card specialist ID-ware. In an email to about 21,000 students and employees, TU Eindhoven announced that personal d... Read more

date2 years ago
Misconfiguration causes controversial data breach at Microsoft

Misconfiguration causes controversial data breach at Microsoft

A misconfigured Azure Blob Storage endpoint caused unauthorized access to large amounts of Microsoft customer data last month. Although security researchers indicate that the breach affects tens of thousands of organizations worldwide, Microsoft believes the extent of the incident is exaggerated. ... Read more

date2 years ago
Sophos MDR gained a myriad of third-party integrations

Sophos MDR gained a myriad of third-party integrations

Sophos unveiled new third-party integrations with its managed detection and response (MDR) service to improve security capabilities across various client and operational environments. As a component of the Sophos Adaptive Cybersecurity Ecosystem, the new third-party support incorporates data fr... Read more

date2 years ago
WIP19 malware threatens IT service providers and telecom companies

WIP19 malware threatens IT service providers and telecom companies

Security researchers from SentinelOne have discovered a new malware cluster dubbed WIP19. The malware variant is likely used by Chinese cybercriminals and primarily targets IT service providers and telecom companies. According to the security researchers, the malware variant recently surfaced am... Read more

date2 years ago
FortiSASE delivers cloud-secured SD-WAN connectivity

FortiSASE delivers cloud-secured SD-WAN connectivity

FortiSASE integrates cloud-delivered SD-WAN connectivity with cloud-delivered security (SSE). This week Fortinet announced cloud-delivered enhancements to FortiSASE that integrate software-defined wide area network (SD-WAN) connectivity with cloud-delivered security to enable flexible secure pr... Read more

date2 years ago
Modern organizations can no longer do without a security fabric

Modern organizations can no longer do without a security fabric

Increasing complexity of organizations' environments poses questions that a security mesh architecture can answer. The number of cybersecurity solutions within organizations is constantly increasing. They have to be, because the environments of these organizations are also becoming increasingly ... Read more

date2 years ago
1 95 96 97 98 99 277