
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Cohesity introduces Data Security Alliance for cybercrime prevention
Cohesity has formed the Data Security Alliance. The coalition of security, data and infrastructure providers ...

Fraudsters use 42,000 fake websites to push adware and ads
Fraud group 'Fangxiao' built a network of 42,000 sites that impersonate well-known businesses. The network...

NSA warns for programming languages without integrated memory security
The US National Security Agency (NSA) urged developers to avoid programming languages that lack integrated me...

Thales confirms that hackers have published their stolen data
Thales Group has announced that Russian-speaking ransomware group LockBit 3.0 has published its data on the d...

‘Most IT executives experience psychological impact after cyberattack’
The cybersecurity of most companies is on shaky ground, according to researchers at Rubrik. The company sugge...

EU pressures Germany to reduce reliance on Huawei
All member states need to implement measures against 'high-risk' vendors, the Commission says. This week, ...

New EU policy obliges member states to increase security measures
European member states have new obligations in terms of national cybersecurity. According to the European Com...

Qualys TotalCloud, Totaalvoetbal to unify the cloud-native team
Think back for a moment, remember when cloud first happened? Keep your company’s data and applications (...

StrelaStealer can steal Outlook and Thunderbird accounts
A new infostealer dubbed 'StrelaStealer' is aggressively stealing account credentials from Outlook and Thunde...

Lenovo fixes vulnerabilities in secure boot firmware
The vulnerabilities could allow hackers to run malicious code before a device boots up. Lenovo has releas...