
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Popular password manager LastPass fell victim to a cyberattack. Hackers managed to steal technical informatio...
Elastic revised its automation and feedback framework with Security Orchestration, Automation and Response (S...
Avast updated its Ransomware Protection functionality to give organizations an additional line of defense aga...
The recent attack on Twilio appears to be part of a much larger hacking operation. More than 130 other compan...
The authority will investigate allegations made by Twitter’s former head of security. France's data prot...
Illumino and Armis joined forces to secure IT, IoT and OT environments. The joint solution should prevent the...
An unauthorized party recently gained access to the databases of streaming service Plex. The organization for...
The attack forced the hospital to send its patients to other facilities. The Center Hospitalier Sud Franci...
Jamf introduces the Safe Internet service for education. The content filtering solution helps schools offer s...
Okta makes Identity Governance generally available, allowing organizations to implement both identity and acc...