
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Infoblox Lookalike Domain Monitoring identifies brand impersonation
Infoblox is adding Lookalike Domain Monitoring to BloxOne Threat Defense. The new feature should help identif...

Venafi Firefly makes machine identities in the cloud a reality
Venafi has announced Firefly, a tool to assign machine identities in cloud-based environments. This allows or...

OpenSSF strengthens supply chain security with SLSA 1.0
SLSA 1.0 is intended to provide a standard language for software supply chain security. The project is at an ...

NCR hit by a ransomware attack, causing outages
NCR, a prominent retail point-of-sale provider and provider of automated teller machine technology, has annou...

Number of phishing attacks increases 50 percent
"Year-over-year, we continue to see an increase in the number of phishing attacks which are becoming more sop...

‘Google releases emergency fix for zero-day Chrome vulnerability’
The company recommends that all users update their desktop versions of the browser immediately. Google rel...

Quantum Key Distribution guarantees secure communication
Quantum Key Distribution is making inroads in the market of (network) communication. By employing some princi...

Goldoson malware infiltrates 60 Google Play apps
A new malicious Android malware known as "Goldoson" has infiltrated the Google Play Store, infecting 60&...

New CCPL initiatives support good-faith security research
The Center for Cybersecurity Policy and Law, an Infosec think tank, has announced two new initiatives aimed a...

‘Western Digital data in hands of hackers’
Storage vendor Western Digital has been the latest company to be hit by hackers. Some ten terabytes of data, ...