
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Microsoft recently introduced two monitoring tools for analytics in its cloud-based security service Microsof...
Darktrace recently introduced its PREVENT/OT solution. With this AI-supported solution, companies can map pot...
The number of global cyber attacks has risen to a new high in the past year. This is according to researchers...
European companies plan to further increase their IT security budgets over the next three years. This is what...
The move is in response to a spike in credential-based attacks. This summer, users of the popular 1Passwor...
The company has added two new languages and a password history feature that provides an extra layer of securi...
Cyber criminals recently modified the ESXi ransomware against scripts that managed to recover affected server...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently released a script that can be used ...
VMware advises users with VMware ESXi servers to perform updates as soon as possible to counter the recent ES...
Cisco expands integration between networking portfolios also in the area of secure access. Last year at ...