
Dutch restrict Nexperia to keep its chip secrets outside of China
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
The A- and M-Series of processors for Apple's mobile devices and PCs contain a vulnerability that allows hack...
Partnership to link Forescout's solutions with Secior's services. Secior and Forescout let us know that th...
The new Darktrace/Cloud solution provides security teams better visibility into cloud architectures. This is ...
The hotel industry has been facing a major global advanced phishing attack since June. This is a two-step att...
1Password has spotted suspicious behavior in its internal Okta account. The incident is related to the recent...
The month of September delivered a record number of ransomware attacks. This is the finding of security ex...
Google has implemented new security features for Gmail and Chrome. In addition to measures for bulk e-mail an...
The vulnerabilities in Citrix NetScaler Gateway and NetScaler ADC cannot be fully resolved with the patches t...
An international coalition of police forces has taken the leak sites of the ransomware gang RagnarLocker offl...
HR-related topics are the most commonly used among hackers to enable phishing attacks. The tactic is far from...