Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
GitHub’s secret scanning alerts service is now generally available
The service is designed to detect leaked secrets across the entire publishing history of a repository, includ...
Fortinet unveils new cybersecurity products and services for OT
The cybersecurity firm is introducing new range of solutions for Operational Technology environments. This...
WIP26 malware attacks telecom operators
The WIP26 malware uses public cloud environments to launch attacks against telecom operators. The malware tri...
Hackers steal sensitive data from US federal police
The US Marshals Service (USMS) has been hit by a ransomware attack. Among the affected systems is a computer ...
WordPress hit with two critical-severity vulnerabilities
Patchstack warns that hackers may exploit two premium add-ons primarily used on real estate websites. The Hou...
Cisco buys Valtix to strengthen Security Cloud
Cisco is acquiring Valtix. The platform helps companies secure their cloud environments. Cisco will add the t...
LinkedIn recruitment scams are becoming more sophisticated
The drive toward remote working has created an opportunity for fraudulent recruitment schemes. LinkedIn ha...
Dole claims ransomware attack had only “limited impact” to operations
The company says it has engaged third party experts to ensure swift remediation, but questions remain. Foo...
Wipro leverages the blockchain to create a new digital identity solution
Wipro Lab45, the innovation lab of Wipro, has launched a Decentralized Identity and Credential Exchange servi...
Assume you have been or will be hacked to avoid the worst
In the security world, several experts recommend assuming that your company has been or will be hacked. This ...