
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Cisco buys cybersecurity and observability company Splunk for $28 billion
Cisco is intending to acquire Splunk. To make this happen, Splunk will be delisted. Cisco offers $157 per sha...

1Password makes Passkeys available in mobile apps and web extensions
Password manager 1Password has announced that 1Password's mobile apps and web extensions now include support ...

International Criminal Court confirms cyber attack, investigation ongoing
The International Criminal Court in The Hague discovered the presence of hackers in its information systems. ...

CrowdStrike enables third-party data on Raptor and announces no-code platform
CrowdStrike is making Raptor and Exposure Management all-encompassing by allowing integration of external dat...

Microsoft AI team accidentally discloses 38 TB of private data
A Microsoft AI research team accidentally disclosed 38 TB of private data and 30,000 internal MS Teams messag...

Microsoft discovers vulnerabilities in ‘ncurses’ programming library
Security specialists at Microsoft recently discovered several vulnerabilities in the popular 'ncurses' librar...

Ransomware attack MGM Resorts occurred by known flaw in Okta platform
The recent ransomware attack on MGM Resorts occurred via a breach in the Okta platform. This was announced by...

Last week in ransomware: Caesars and KNVB pay, MGM struggles on
Over the past week, several ransomware incidents illustrated the dilemmas a company faces once they fall vict...

Sponsored WebEx search result is the source of malware infection
A fake Google Search result for the Cisco WebEx software causes victims to download the BatLoader malware. Th...

IBM: ‘Cloud threats doubled compared to 2019’
Compared to 2019, the number of threats to cloud environments appears to have doubled. Login credentials are ...