
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

LockBit 3.0, the market leader in ransomware
LockBit has been gaining notoriety with the likes of the British Royal Mail and Deutsche Bank. The ransomware...

Microsoft Defender floods users with false password notifications
Microsoft Defender for Endpoint has inundated system administrators with false alerts. The service flagged mu...

Not all XDR platforms are created equal: quality telemetry is critical
Organizations are poorly prepared for cyber attacks, according to Cisco's recent Cybersecurity Readiness Inde...

Capita admits hackers stole customer data
Major UK government outsourcer Capita has revealed that it lost more than just access to MS Office. This w...

‘ChatGPT creates mostly insecure code’
Moreover, the chatbot fails to alert users to its coding defects - even though it could do so. This week T...

Noname and Wiz join forces for better cyber resilience
Noname Security and Wiz are teaming up to combine their expertise in API and cloud security. In the process, ...

Bitsight expands cyber risk management services
Cyber risk management firm Bitsight has announced an expansion of the services it offers. Together with credi...

CrowdStrike’s new XDR service offers AI-powered threat intelligence
CrowdStrike announced today the launch of a new AI-powered service. It combines human expertise with AI-power...

‘Hackers breach Microsoft SQL servers to deploy Trigona ransomware’
The malware exploits a Windows vulnerability to "perform malicious behaviours". Hackers are distributing T...

Dell builds ecosystem to drive faster adoption of zero trust security
The new cybersecurity ecosystem unifies the services of 30 companies. It is intended to make adoption of zero...