
Dutch restrict Nexperia to keep its chip secrets outside of China
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A French-speaking cybercrime ring is said to have hauled off $30 million from fifteen countries over five yea...
According to cybersecurity agency ENISA, the Russian attack on Ukraine led to larger, more destructive cybera...
Veeam launched Backup for Salesforce, a long-awaited backup solution for data and metadata in Salesforce. ...
One of the telco's partners suffered a cyberattack, endangering the organization's data. Vodafone Italia h...
Researchers at software supply chain security firm Phylum have discovered over two dozen Python packages...
Virtually all incidents start at a data center. Yet the OT security of data centers in particular is often su...
Thales, a major French defence and technology group, announced that criminal group LockBit 3.0 claims to have...
Storage provider Dropbox disclosed that cybercriminals stole 130 GitHub repositories through an employee's ac...
OpenSSL version 3.0.7 is now available and should be applied as soon as possible, the developers say. Ope...
A vulnerability in Microsoft Azure Cosmos DB allowed unauthorized cybercriminals to remotely execute code in ...