
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

‘Europe’s critical infrastructure hit by 3CX supply chain attack’
The attack by a North Korean hacker group that led to the 3CX breach has had ripple effects in the European e...

Flashpoint unveils Ignite platform for faster threat detection
Security vendor Flashpoint is launching a new threat detection platform. With Ignite, users should be able to...

Intel and Google work together to strengthen Confidential Computing
Teams from Google Project Zero and Intel have put Intel Trust Domain Extensions (Intel TDX) under the microsc...

SentinelOne deploys generative AI on cyber detection platform
SentinelOne is going to deploy AI to counter cybercrime. It launched a new platform at the 2023 RSA Conferenc...

Cisco XDR aims to reduce alert fatigue, increase signal to noise ratio
Cisco is working hard on the Cisco Security Cloud. Starting today, it is adding Cisco XDR to it. According to...

Intel to accelerate Noname Security software
Noname Security promises better performance thanks to a partnership with Intel. The security company expects ...

Confidential computing creates enclaves of privacy and security
Confidential computing is essentially a type of technology that aims to improve data privacy and security. Th...

GitHub: private vulnerability reporting now generally available
The feature makes it easier for researchers and maintainers to report and fix vulnerabilities on public repos...

This is how to keep mobile devices safe in the workplace
Keeping your mobile devices safe in the workspace is very important, but many organisations don't have enough...

Police task force doesn’t want Meta to expand end-to-end encryption
The Virtual Global Taskforce (VGT) wants Meta to abandon end-to-end encryption on Facebook Messenger and Inst...