Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Iranian cyber attack on US government website launched

Iranian cyber attack on US government website launched

A group of Iranian hackers has taken down an American government website and have left a message claiming that they work for the Iranian state. The tensions between the US and Iran are now shifting to the cyber world as well, as the hackers claim retaliation for the death of the Iranian general Sol... Read more

date4 years ago
FBI wants to protect companies from hackers using obfuscated data

FBI wants to protect companies from hackers using obfuscated data

In an effort to better protect companies against actions by hackers or malicious own staff, the FBI changes its strategy to take action only after an attack has taken place. A more active attitude should improve security. Not only does the FBI contact companies when information is gathered that ... Read more

date4 years ago
Extension for management of crypto-keys steals data

Extension for management of crypto-keys steals data

According to researchers, an extension for Google Chrome that should make it easier for owners of multiple crypto-wallets to manage them, turns out to run off with those keys. In a twitter post, Harry Denley, security director at MyCrypto, states that an app called Shitcoin Wallet can be dangero... Read more

date4 years ago
‘Dell contemplates full Secureworks acquisition’

‘Dell contemplates full Secureworks acquisition’

According to sources, Dell Technologies is considering buying the remaining shares of cybersecurity company Secureworks, a report by Bloomberg shows. Sources state that Dell is interested in buying the remaining 13.8 percent of Secureworks' shares. This would mean that the company would become f... Read more

date4 years ago
‘More and more companies pay after ransomware attack’

‘More and more companies pay after ransomware attack’

As the number of ransomware attacks continues to grow, more and more organisations are actually paying cybercriminals to access their data and systems again. The number of ransomware victims succumbing to extortion has more than doubled in the past year, according to global research by CrowdStri... Read more

date4 years ago
Email attacks are source of stress for security professionals

Email attacks are source of stress for security professionals

Security professionals in Europe experience a high workload due to e-mail attacks. Investigating their fraudulent nature takes a long time. 7 percent of EU security teams receive more than 50 suspicious emails a day, while 32 percent receive between 6 and 50 of these emails every day. Barracuda... Read more

date4 years ago
F5 Networks acquires Shape Security to improve app security

F5 Networks acquires Shape Security to improve app security

F5 Networks, specialist in network traffic management, is taking over Shape Security for approximately 1 billion dollars. That American company is known for its fraud detection platform for airlines, banks, government agencies and retailers. With the acquisition, F5 Networks wants to improve its... Read more

date4 years ago
New ransomware strain encrypts data after stealing it

New ransomware strain encrypts data after stealing it

A ransomware strain from the Zeppelin group can steal data and then encrypt it. Many forms of ransomware, only encrypt data, but do not steal it first. Examples include REvil, Maze, and Snatch, which steal the encrypted data first. Zeppelin can also do this now. Cybersecurity firm Morphisec made... Read more

date4 years ago
Google blocks ‘less secure apps’ for G Suite from June 2020

Google blocks ‘less secure apps’ for G Suite from June 2020

Apps that ask for your G Suite account username and password, to sign in directly to your G Suite-account, will no longer be able to access G Suite starting from February 15th, 2021. Google considers apps that use this login method to be 'less secure apps' and will only allow logins with an OAuth t... Read more

date4 years ago
1 203 204 205 206 207 273