
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Security researchers revealed never-seen-before malware that competent North Korean hackers use to sneak, rea...
Fortinet introduces the FortiGate 4800F. The company describes the device as the fastest compact firewall for...
VMware launched Carbon Black Workload for Amazon Web Services. The solution runs on AWS and secures on-premis...
Despite the scare, initial reports of "35,000 projects infected" proved not to be true. Thousands of GitHu...
New pre-built queries will make it easier for companies to manage their cloud security. Google Cloud annou...
Microsoft unveiled two new solutions that give SOCs more access to the threat intelligence data that Microsof...
VMware warns of an authentication vulnerability that could allow hackers to gain administrator privileges. Th...
APIs are increasingly targeted to attack organizations. Salt Security's customers saw twice as much malicious...
Private investor Thoma Bravo announced the acquisition of Ping Identity. Ping Identity develops access manage...
Qualys added external attack surface management (EASM) capabilities to CyberSecurity Asset Management 2.0, a ...