Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Login details of 500,000 Zoom accounts available on dark web

Login details of 500,000 Zoom accounts available on dark web

The login details of more than 500,000 Zoom accounts are offered for sale on the dark web, according to research by Cybersecurity firm Cyble. The data is comprised of e-mail addresses, passwords and meeting IDs of the video conferencing app. Cyble itself tested a number of the accounts offered, ... Read more

date4 years ago
‘Remote Desktop Protocol attacks up by 30 percent in March’

‘Remote Desktop Protocol attacks up by 30 percent in March’

According to SANS Institute, there was a 30 percent increase in attacks on Remote Desktop Protocol servers in March. The increase corresponds to the increase in exposed RDP servers measured by Internet of Things (IoT) search engine Shodan. The findings point to a risk for companies that have to ... Read more

date4 years ago
Zscaler acquires cloud security startup Cloudneti

Zscaler acquires cloud security startup Cloudneti

Cloud security specialist Zscaler will acquire the American startup Cloudneti. The startup's technology should make it easier for customers to discover configuration vulnerabilities in their public cloud and SaaS applications. With the acquisition, the cloud security specialist gets a product th... Read more

date4 years ago
Box expands Box Shield with malware detection

Box expands Box Shield with malware detection

Box, a specialist in the field of cloud-based content management and cloud storage, has recently updated its security tool Box Shield. The update focuses on new functionality for detecting malware. The Box Shield solution from the cloud-based content management and storage specialist should enab... Read more

date4 years ago
Fingerprint scanners Apple and Samsung bypassed with 3D printer

Fingerprint scanners Apple and Samsung bypassed with 3D printer

Using a 3D printed fingerprint, Cisco Talos security researchers succeeded in passing the fingerprint scanner on phones and computers from Samsung and Apple, among others. Several tried and tested devices passed the test, using exactly the same security solution: Windows Hello. In all other case... Read more

date4 years ago
Significantly more ransomware detected in early 2020

Significantly more ransomware detected in early 2020

An increase of twenty percent was detected for ransomware in February compared to a month earlier. Cybersecurity firm Trend Micro noted significant growth, including a significant increase in Business Email Compromise (BEC), where companies are trying to steal money. For February as a whole, Tre... Read more

date4 years ago
HP Support Assistant still has vulnerabilities despite patches

HP Support Assistant still has vulnerabilities despite patches

Of a dozen vulnerabilities found in HP Support Assistant, three are still present in the standard software installed on HP computers running Windows as OS. HP computers come standard with HP Support Assistant, which monitors the device in use. Among the features provided by Support Assistant is ... Read more

date4 years ago
‘More than 12,000 Android apps contain backdoors’

‘More than 12,000 Android apps contain backdoors’

Extensive academic research has discovered hidden backdoors in 12,706 Android applications. These include secret access keys, master passwords and secret commands found in 6,800 Play Store apps, 1,000 apps from third-party app stores and nearly 4,800 pre-installed apps. Academics from Europe and... Read more

date4 years ago
Docker instances hit by crypto-mining malware

Docker instances hit by crypto-mining malware

Researchers of security specialist Aqua Security have found that hackers have been scanning Docker instances for possible unsecured API ports for several months now. When these are found, they are attacked, to then install new Kinsing crypto-mining malware. Research by the security specialists h... Read more

date4 years ago
1 197 198 199 200 201 277