Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Data of 21,000 Nissan customers leaked via Red Hat
Nissan Motor Co. reported on Monday that the personal data of approximately 21,000 customers had been exposed...
OpenAI: the risk of prompt injection may never disappear
OpenAI states that prompt injection will probably never disappear completely, but that a proactive and rapid ...
SailPoint integrates with CrowdStrike Falcon for faster threat response
SailPoint has announced new integrations with the CrowdStrike Falcon platform to connect identity governance ...
Palo Alto Networks migrates largely to Google Cloud and signs landmark deal
Palo Alto Networks and Google Cloud are already partners, but are significantly strengthening their ties. Cri...
Microsoft patches bug causing multiple Message Queuing errors
Update, December 19: Microsoft has released an out-of-band (OOB) update to fix the Message Queuing errors des...
AI conversations of 8 million users leaked via browser extensions
Browser extensions that promise privacy are found to be selling AI conversations from millions of users. Secu...
Pornhub hack: 200 million user data stolen by ShinyHunters
Hacker group ShinyHunters has stolen data from over 200 million premium customers of porn website Pornhub. Th...
ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance
As cyber threats grow in scale and complexity, protecting network-connected devices has become a strategic pr...
Cisco Foundation AI takes on key role within Identity Intelligence
First production deployment of proprietary AI model
CrowdStrike expands Falcon with security for AI interactions
CrowdStrike is making Falcon AI Detection and Response (AIDR) generally available. With this expansion, the s...