
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Atlassian patches critical flaws in Bitbucket and Crowd Server
Atlassian launched critical-severity patches for identity management solution Crowd Server and Data Center an...

1Password to offer passwordless login from 2023 onwards
1Password will update its password manager solution with passkeys starting in 2023. Passkeys allow users to l...

SandboxAQ lands contract to defend US government against quantum attacks
Google spinoff SandboxAQ has landed a US Department of Defense contract to secure government systems against ...

Meta fires employees for accepting bribes and hacking accounts
Meta has reportedly fired several employees for fraudulent practices. CNBC reports that Meta has let off o...

Palo Alto Networks wants to acquire Cider Security for €188 million
Palo Alto Networks intends to acquire Israeli startup Cider Security for roughly €188 million ($195 million...

Palo Alto Networks launches PAN-OS 11
Palo Alto Networks launched PAN-OS 11 Nova, a major update to its operating system. The organization also int...

Rubrik helps businesses recover after ransomware
Rubrik recently introduced Rubrik Cyber Recovery. The zero-trust data security vendor aims to help companies ...

Noname Recon scans companies from the perspective of a cybercriminal
Noname Security unveiled Noname Recon. The solution finds public APIs and domains that make an organization v...

Researchers break security guarantees of networking in spacecraft
A group of researchers found holes in the security of Time-Triggered Ethernet applications in spacecraft. ...

Magento stores face wave of TrojanOrders attacks
At least seven criminal groups are responsible for a significant increase in TrojanOrders attacks on Magento ...