Armis Security provides insight into IT, OT and IoT vulnerabilities
New security vendor in our region promises insight into the vulnerability of all conceivable assets within the organization and does this in a user-friendly and simple way.
If you really want to tackle security properly, you must first know what you have in terms of assets, and what these assets... Read more
How do you interpret the results of MITRE ATT&CK evaluations?
Not all detections are created equal. Keep that in mind when choosing cybersecurity tools.
The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more
Ransomware is an APT, so you should treat it as such
Research from Splunk's SURGe division shows that there are major differences between ransomware variants in how fast they operate. Why is that important for organizations to know? And what does that mean for Splunk's product offering?
We talk about the above and other issues with Johan Bjerke, P... Read more
Microsoft’s initiative to fill cybersecurity jobs is expanding to more countries
In October 2021, Microsoft announced a cybersecurity skills campaign to help more people get careers in the field. The IT giant has revealed that the program will be expanded to 23 other nations.
Microsoft will invest in countries with a high cyber threat risk and a cybersecurity workforce short... Read more
EU proposes rules for EU bodies to prevent cybersecurity attacks
The European Commission said that EU nations should establish a framework to manage cybersecurity threats at EU institutions amid fears about growing cyberattacks that might interrupt essential activities and gain unauthorized access to sensitive data.
The idea is part of a package of proposed E... Read more
Data breaches get bigger, do people still care? We need cyber resilience
There was a time when an enormous data breach would concern people. People were afraid when someone stole their credentials. That feeling seems to have disappeared. Data breaches are as ordinary as DDOS attacks. People don't seem to care anymore. It also means that it has become harder for cybercri... Read more
2022 is the year of API security, Salt Security plays an important role
APIs are tremendously useful and are in use almost everywhere these days. But how do you make sure that attackers can't abuse them? That's the question Salt Security took up in 2016. We spoke with co-founder and CEO Roey Eliyahu and also received a demo of Salt's platform.
APIs are getting a lot... Read more
Cybercrime dominates the world: ‘just the tip of the iceberg visible’
The world of cybercrime is gaining a stronger grip on business. Cybercriminals are becoming smarter, using more advanced techniques and attacking more frequently. Many security experts no longer question if a company will be hacked, but when a company will be hacked. In order to get a better pictur... Read more
Fortinet guarantees secure network access with Zero Trust
Zero Trust is seen as an essential security model to secure enterprise networks. However, security vendors envision the model in different ways. Fortinet determined that secure network access should be the goal. We discussed the topic with Robert Tom, Systems Engineer at Fortinet.
The idea behin... Read more
Log4Shell: what is Log4j, who does it affect and how do you patch it?
A critical vulnerability in a widely used open-source library for Java puts the global IT landscape on alert. The likelihood that your environment is affected has rarely been more significant. Solving starts with understanding. As such, we explore the problem with the Log4j vulnerability known as L... Read more
Companies face significant security risks — fortunately, they can be mitigated
Medium-sized companies are often popular targets for cybercriminals. The security of these organisations is not always at the right level, allowing hackers to break in and cause significant damage with relative ease. However, with a good approach and strategy, the risks can be limited
'The quest... Read more
Don’t make cybersecurity the end user’s problem
Human beings are the weakest link in the chain of cybersecurity, you often hear. Roel van Rijsewijk from Thales is very annoyed about this approach. The reason for this is that the responsibility in this area lies not with the people who deal with it, but with the end users. That must and can be do... Read more