Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

WordPress patches four serious threats ahead of version 5.9

WordPress patches four serious threats ahead of version 5.9

WordPress introduces an emergency patch for four critical vulnerabilities. WordPress 5.8.3 is available immediately. WP_Meta_Query and WP_Query, two of the content management system's classes, were found to be vulnerable to SQL injection attacks. Furthermore, XXS attacks were enabled by post slu... Read more

date2 years ago
Security researchers find new Log4Shell in H2 database software

Security researchers find new Log4Shell in H2 database software

Security organization JFrog has found a vulnerability in H2. The problem is similar to Log4Shell, the infamous threat in Log4j. H2 consoles on servers accessible from the outside can be abused for remote code execution (RCE). Multiple lines of code in H2 send urls to a 'javax.naming.Context.look... Read more

date2 years ago
Hackers use Google Doc comment emails to trick security tools

Hackers use Google Doc comment emails to trick security tools

Avanan, a cybersecurity company, has shown a rise in the use of Google Docs’ productivity features to sneak malicious content past spam filters and security tools. Jeremey Fuchs, from Avanan, said the company saw cyberattackers use the comment feature in Google Docs over December to attack Outloo... Read more

date2 years ago
Google acquires startup Siemplify, expands its SOAR functionality

Google acquires startup Siemplify, expands its SOAR functionality

Google acquires security startup Siemplify to expand its data breach prevention capabilities. For this purpose, the startup's technology will be integrated into Chronicle, the tech giant's proprietary security business unit. With the acquisition of Siemplify, also known as CyArx Technologies, Go... Read more

date2 years ago
Security is key to Citrix Workspace and hybrid working

Security is key to Citrix Workspace and hybrid working

Virtualizing the workplace in the cloud or a data center received a huge boost through COVID-19. It's safe to say that Citrix is leading the way when it comes to virtualizing the workplace with Citrix Workspace. More and more companies will opt for a virtualized workplace, particularly from a secur... Read more

date2 years ago
European companies frequent targets of Initial Access Brokers

European companies frequent targets of Initial Access Brokers

Initial Access Brokers (IABs) are a growing threat to businesses, according to research by Group-IB. These IABs find vulnerable companies and sell access to other cybercriminals. It makes the work of ransomware operators easier. As a result, the number of ransomware attacks is also increasing. We s... Read more

date2 years ago
Ransomware attack forces Portuguese media group Impresa offline

Ransomware attack forces Portuguese media group Impresa offline

The attack is one of the most serious in that country's history The Lapsus$ ransomware gang has compromised the infrastructure of Impresa, the largest media conglomerate in Portugal. Impresa owns SIC TV channel, and Expresso newspaper, among other leading media, like several magaz... Read more

date2 years ago
1 145 146 147 148 149 273