
Pro-Russian hacker group claims attack on Dutch government websites
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Despite consistent efforts to thwart it, ransomware remains a persistent problem for businesses and consumers...
Using the NFC to unlock the car makes it easy for the driver, but gives thieves a chance to create their own ...
Noname Security releases version 3.0 of its API Security Platform. With the new version, so-called AppSec spe...
Cisco is launching the Security Cloud, a platform that should provide companies with the best security for th...
Ransomware groups are mushrooming, hack tools became increasingly difficult to spot and human experience rema...
Expert recommends organizations should adopt a 'security by PlayStation' model. European Union legislators...
The company has added key strategic partners to the CrowdXDR Alliance. This week Crowdstrike made two impo...
The new version of security platform Qualys VMDR will be available from the end of June onwards. Qualys VMDR ...
Confluence is vulnerable to remote code execution. Atlassian urges users to disable the software until the pa...
The device poses a threat to users as well as any network it connects to. This week Ars Technica reported ...