Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Google sees increase in AI abuse by cybercriminals
The latest analysis from the Google Threat Intelligence Group shows that malicious actors are no longer just ...
Palo Alto completes $25 billion acquisition of CyberArk
Palo Alto Networks has officially completed its $25 billion acquisition of CyberArk. Identity security will n...
Microsoft reports six actively exploited zero days in Patch Tuesday
Microsoft fixed a total of 58 vulnerabilities during Patch Tuesday in February 2026. That is fewer than in ma...
Palo Alto wants to use vibe coding to better protect organizations
Palo Alto Networks staged its Ignite on Tour London event this month at a time of growth and expansion for th...
Sophos acquires Arco Cyber to assist CISO-less organizations
Sophos has acquired Arco Cyber. The addition of the British security company is intended to bring AI-powered ...
AI does not save SOC teams from the signal-to-noise malaise
AI does not appear to be a miracle cure for improving the signal-to-noise ratio for SOC teams. Even though AI...
Attackers exploit SolarWinds vulnerability to deploy ransomware
Security researchers warn of active attacks on SolarWinds Web Help Desk. Malicious actors are exploiting vuln...
BeyondTrust Remote Support has a critical vulnerability
BeyondTrust Remote Support and older versions of Privileged Remote Access contain a critical vulnerability th...
Over 40,000 OpenClaw agents vulnerable
Security experts have discovered tens of thousands of unsecured OpenClaw instances. The AI agents run vulnera...
ISO 27001 inspires confidence, but it is only the beginning
ISO 27001 certification is anything but easy. Nevertheless, security standards create a false sense of securi...