
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Endor Labs tool helps secure open-source AI
Endor Labs has released the AI Model Discovery tool, which allows companies to discover open-source AI models...


Okta secures long-term partnership with F1 team McLaren Racing
F1's latest constructors' champion McLaren Racing is teaming up with Okta. The two parties have announced a m...

Torq debuts in EMEA after growth spurt in 2024
Torq, founded in 2019, achieved a 300 percent revenue growth by 2024. The next step is to open an EMEA headqu...

Apple fixes zero-day affecting iPhones, Macs and more
Apple has released software updates to address several security vulnerabilities in its product portfolio, inc...

GhostGPT: rogue chatbot aids cybercrime
A recently introduced AI chatbot called GhostGPT provides cybercriminals with a handy tool for developing mal...

Increase 2FA adoption among employees and customers
What can you do to properly integrate two-factor authentication (2FA) into your organization without deterrin...

Phishing campaign targets mobile devices via PDFs
A new phishing campaign posing as the U.S. Postal Service USPS is targeting mobile devices. The attack uses s...

Juniper routers targeted by backdoor malware
The so-called "J-Magic" malware installs a backdoor on Juniper Networks routers and specifically targets the ...

Cybercriminals use SSH tunnelling to access VMware ESXi
Ransomware actors targeting ESXi bare-metal hypervisors are using SSH tunnelling to access the system without...