
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Ivanti patches another zero-day that grazed the Norwegian government
Ivanti has once again patched a zero-day vulnerability in its Endpoint Manager Mobile (EPMM) software. At iss...

Google: “vulnerabilities persist too long on Android”
Google has released its annual report on zero-day vulnerabilities. Google's Threat Analysis Group (TAG) indic...

‘Dutch government insisted on backdoor in TETRA system’
The Dutch government knows for at least thirty years that the TETRA system is weakly encrypted. Consequently,...

Samsung and Microsoft to unify hardware-level phone security
Samsung and Microsoft have announced that they will dramatically strengthen the security level of Galaxy smar...

Android now alerts when someone is stalking you
Google is rolling out "tracker alerts" for Android starting today. This security feature alerts you if an unk...

Palo Alto Networks brings CI/CD Security to Prisma Cloud
Palo Alto Networks unveiled the continuous integration and continuous delivery (CI/CD) security module at its...

Microsoft Defender for IoT soon to scan Linux devices
Microsoft is releasing the new Firmware Analysis feature for Defender for IoT. Soon, the software will be abl...

SentinelOne protects cloud storage from malware for AWS and NetApp
SentinelOne is releasing a new product line to protect data in the cloud from malware. In the new Cloud D...

Citrix plays into wide variety of IT environments with unified offerings
Today, Citrix announced new capabilities for its cloud and on-prem solutions for hybrid environments. As orga...

Half of all phishing emails are HR-related
Hackers often use HR-related topics for their phishing emails. That's according to security awareness pla...