Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Microsoft warns of virus hijacking browser and stealing data

Microsoft warns of virus hijacking browser and stealing data

Microsoft has found a virus that creates fake search results and hijacks stored login details. The Windows virus, named Adrozek, has been installed on at least 30,000 computers. The virus spreads by leading victims to a rogue website that persuades them to download and install the malicious soft... Read more

date3 years ago
PowerPepper malware poses threats to enterprises

PowerPepper malware poses threats to enterprises

The new Windows exploit targets businesses in US, Asia and Europe. Security researchers at Kapersky Labs have published detailed descriptions of a new in-memory Windows malware that can execute remote code on target companies in Europe, Asia, and the US. Hackers use the backdoor exploit to ... Read more

date3 years ago
Ivanti completes acquisition of MobileIron and Pulse Secure

Ivanti completes acquisition of MobileIron and Pulse Secure

The combination enhances Ivanti’s security offerings. Ivanti has announced it has closed the acquisitions of MobileIron and Pulse Secure. Salt Lake City based Ivanti automates IT and security operations to discover, manage, secure and service from cloud to edge. MobileIron a leading provide... Read more

date3 years ago
BlackBerry wants to secure growing number of endpoints at companies

BlackBerry wants to secure growing number of endpoints at companies

BlackBerry has been committed to securing company endpoints for years. The company particularly does this through Unified Endpoint Management (UEM) and Unified Endpoint Security (UES). Both security approaches aim to provide an answer to the growing number of devices within companies. After all, mo... Read more

date3 years ago
Meet Egregor: the next big malware threat to your business

Meet Egregor: the next big malware threat to your business

The new group has become the leading ransomware variant, say industry experts. A new ransomware group has emerged on the scene and quickly shot up to the top in terms of threat magnitude. Cybersecurity researchers at Digital Shadows say the new variant is becoming increasingly prolific. Cybe... Read more

date3 years ago
Hacker publishes exploits of Fortinet’s FortiGate VPNs

Hacker publishes exploits of Fortinet’s FortiGate VPNs

The hacker leaked sensitive details citing Fortinet SSL VPNs vulnerability on a prominent hacker forum. A hacker using the alias “pumpedkicks” published a large list of one-line exploits of around 50,000 Fortinet FortiGate IPs containing a path traversal vulnerability classified as CVE-2018-... Read more

date3 years ago
Ransomware success is driven by victims who pay the ransom

Ransomware success is driven by victims who pay the ransom

Over a quarter of organizations that have been paralyzed by ransomware attacks choose to pay the ransom. They do this because they don't have any other options than to accept the demands of the criminals targeting them. The average ransom amount is now more than 1 million dollars. A study by Cro... Read more

date3 years ago
Security Report: Web app attacks are up 800% compared to 2019

Security Report: Web app attacks are up 800% compared to 2019

All categories of attacks have increased as hackers adapt their tactics to the pandemic world. CDNetworks, a leading CDN and cloud security provider, has released their State of the Web Security for H1 2020 Report. The Report describes a massive increase in cyber attacks in 2020 compared to 2019... Read more

date3 years ago
1 183 184 185 186 187 277