
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

German Chambers of Commerce suffers extensive cyberattack
The Association of German Chambers of Industry and Commerce (DIHK) took down its IT systems, digital services...

State-backed North Korean hackers have a smart way of reading your Gmail
Security researchers revealed never-seen-before malware that competent North Korean hackers use to sneak, rea...

Fortinet releases compact FortiGate 4800F firewall for data centers
Fortinet introduces the FortiGate 4800F. The company describes the device as the fastest compact firewall for...

VMware brings Carbon Black Workload to AWS
VMware launched Carbon Black Workload for Amazon Web Services. The solution runs on AWS and secures on-premis...

Clones laced with malware discovered and purged from GitHub
Despite the scare, initial reports of "35,000 projects infected" proved not to be true. Thousands of GitHu...

Google announces MITRE ATT&CK mappings for cloud security
New pre-built queries will make it easier for companies to manage their cloud security. Google Cloud annou...

Microsoft gives enterprise SOCs more access to threat intelligence data
Microsoft unveiled two new solutions that give SOCs more access to the threat intelligence data that Microsof...

VMware patches critical bug in Workspace ONE Access and vRealize
VMware warns of an authentication vulnerability that could allow hackers to gain administrator privileges. Th...

‘Malicious API traffic doubled over the past year’
APIs are increasingly targeted to attack organizations. Salt Security's customers saw twice as much malicious...

Thoma Bravo acquires Ping Identity for €2.8 billion
Private investor Thoma Bravo announced the acquisition of Ping Identity. Ping Identity develops access manage...