Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Wiz raises $1B at $12B valuation to continue its acquisition spree
Security company Wiz is well on its way to an IPO. Before that happens, it wants to achieve $1 billion in ann...
New Forcepoint ONE Data Security provides zero-trust full-stack solution
US cybersecurity specialist Forcepoint introduced its new platform, Forcepoint ONE Data Security at the RSA C...
SentinelOne promotes Purple AI from security assistant to autonomous SOC analyst
New functionality in SentinelOne's Singularity Platform should ensure that an SOC is no longer just something...
HPE Aruba fights AI with AI in its security and observability tools
HPE Aruba Networking sees AI threats are on the rise. At the same time, AI can alleviate these risks by detec...
Microsoft Security tackles AI safety pitfalls with Defender for Cloud
Once again, Microsoft emphasizes that it is prioritizing security. At the 2024 RSA Conference, the company is...
AT&T Security renamed LevelBlue in new joint venture
AT&T Cybersecurity has been renamed LevelBlue after entering into a joint venture. Private Equity firm Wi...
Arctic Wolf strengthens security of hybrid work with SSE integrations
Arctic Wolf is tackling common threats to organizations. It does so by integrating with SSE solutions from Ca...
Microsoft offers zero trust at the DNS level with ZTDNS
Microsoft is implementing stricter security policies and is tackling security at the Domain Server Name (DNS)...
Windows Events logs allow for checking data theft in Chromium browsers
During a malware attack, administrators can use Windows Events logs to check whether sensitive data leaks fro...
Update: ‘Wiz acquisition deal for Lacework collapses’
Update (May 3, 2024): Wiz's proposed acquisition of Lacework has been canceled. Although a letter of intent h...