Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Security Report: Web app attacks are up 800% compared to 2019

Security Report: Web app attacks are up 800% compared to 2019

All categories of attacks have increased as hackers adapt their tactics to the pandemic world. CDNetworks, a leading CDN and cloud security provider, has released their State of the Web Security for H1 2020 Report. The Report describes a massive increase in cyber attacks in 2020 compared to 2019... Read more

date3 years ago
Drupal sites are vulnerable to a hacking trick popular in the 90s

Drupal sites are vulnerable to a hacking trick popular in the 90s

The team that makes the Drupal CMS (Content Management System) has released security updates to fix a critical vulnerability, giving attackers full control over Drupal sites. Drupal is the fourth most-used CMS on the internet, trailing WordPress, Shopify, and Joomla. The vulnerability was rated ... Read more

date3 years ago
‘China-sponsored hacker group attacks companies worldwide’

‘China-sponsored hacker group attacks companies worldwide’

A hacker group allegedly sponsored by the Chinese Government has attacked a large number of companies around the world. The group, called Cicada, is said to be targeting the data stored on the companies' servers. In a blog post, security company Symantec writes that various digital fingerprints ... Read more

date3 years ago
FireEye acquires Respond Software

FireEye acquires Respond Software

Security company FireEye has announced that it has made a deal for the acquisition of Respond Software. FireEye wants to incorporate Respond's software into its own products. Respond Software is a company that specializes in helping companies investigate and understand security incidents. This s... Read more

date3 years ago
Tanium announces IBM collaboration

Tanium announces IBM collaboration

Security company Tanium has announced a collaboration with IBM. The companies will jointly introduce a security package for the hybrid cloud. The two companies are working on a service that ensures the security and compliance of workloads in hybrid cloud environments. The service is particularly... Read more

date3 years ago
Google introduces DDoS protection for Cloud customers

Google introduces DDoS protection for Cloud customers

Google has announced Cloud Armor Adaptive Protection. The service uses technologies such as machine learning to recognise DDoS traffic and prevent servers from falling victim to DDoS attacks. The product builds on Google's years of experience in mitigating DDoS attacks, such as the 2.54Tbit/s at... Read more

date3 years ago
Palo Alto Networks unveils new native 5G security offering

Palo Alto Networks unveils new native 5G security offering

New offering will enable service providers and Enterprises to create new revenue streams while securing 5G. This week Palo Alto Networks introduced the industry's first 5G-native security offering. This new offering enables service providers and enterprises to turn 5G networks into highly secure... Read more

date3 years ago
AWS launches AWS Network Firewall to protect VPCs

AWS launches AWS Network Firewall to protect VPCs

Move signals Amazon's expansion into the cybersecurity sector. AWS this week expanded its presence in the cybersecurity market with the introduction of AWS Network Firewall. The new product is a high availability, managed network firewall service for virtual private clouds (VPC). In a blog p... Read more

date3 years ago
Microsoft developing successor to Trusted Platform Module

Microsoft developing successor to Trusted Platform Module

Microsoft is working on a new chip to protect the security keys used by a machine. The so-called Pluton chip serves as a successor to the TPM chips but should be more secure because the chips are mounted on the processors themselves. The existing Trusted Platform Modules take on a number of secu... Read more

date3 years ago
Hackers use cloud services to enhance their flexibility and speed

Hackers use cloud services to enhance their flexibility and speed

Are underground cloud services a thing Well, they are quite real, and criminals are taking advantage of their presence to accelerate attacks and give compromised businesses no room to react. This information comes from Trend Micro’s new report on cybersecurity. The firm found terabytes of inte... Read more

date3 years ago
1 184 185 186 187 188 277