Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Vulnerability in Gigabyte driver used for ransomware attack

Vulnerability in Gigabyte driver used for ransomware attack

A no longer used Gigabyte driver has been discovered, with a digital signature, which can still be used to fully encrypt the files on a computer. Cybersecurity firm Sophos investigated, and concluded that a workaround it was indeed possible. Ransomware RobbinHood would use the outdated driver wi... Read more

date4 years ago
Accelerated cloud adoption leads to misconfigurations

Accelerated cloud adoption leads to misconfigurations

According to new research by Palo Alto Networks, cloud misconfigurations often occur due to poor 'security hygiene'. Specifically, the research states that companies are automating the building process of cloud infrastructure, resulting in new 'infrastructure as code' (IaC) templates. However, t... Read more

date4 years ago
‘Free’ movies popular as a phishing and malware tool

‘Free’ movies popular as a phishing and malware tool

'Click here to see Joker for free', that's how users recently have been tempted to click on a link. They are then directed to a website where they have to fill in a lot of personal information before they can download a strange file. After that, they don't get the movie, but they do get a whole bun... Read more

date4 years ago
Ekans-ransomware targets industrial control systems

Ekans-ransomware targets industrial control systems

Cybercriminals have launched ransomware attacks specifically targeting Industrial Control Systems (ICS). According to researchers, this is the first case of malware that encrypts data in those environments. A new report by security company Dragos shows that Ekans, or also Snake, as the ransomwar... Read more

date4 years ago
Tanium cybersecurity goes beyond Unified Endpoint Management

Tanium cybersecurity goes beyond Unified Endpoint Management

Within the cybersecurity market, most experts agree that it is time for a new way of working. The number of tools that enterprise organisations use to implement their security policies rises to around 100. As a result, solutions are not used efficiently enough, as security teams are too small to ac... Read more

date4 years ago
‘Shadow IoT major threat to corporate networks’

‘Shadow IoT major threat to corporate networks’

Infoblox publishes a new study this week that points to a significant threat to corporate networks by the Shadow IoT. This consists of devices that are part of a company network, but of which this is not known. For the report What's Lurking in the Shadows, 2,650 IT professionals were interviewed in... Read more

date4 years ago
Hackers use smart-control of buildings for DDoS attacks

Hackers use smart-control of buildings for DDoS attacks

A vulnerability that allows even 'inexperienced hackers with little expertise' to access the smart-control of some buildings and launch a DDoS attack from there. Because Nortek Security and Control (NSC) has failed to address a vulnerability that was identified almost a year ago, this has become a ... Read more

date4 years ago
Microsoft rolls out Intel update for Windows 10 PCs

Microsoft rolls out Intel update for Windows 10 PCs

Vulnerabilities in a range of Intel CPUs need to be fixed as soon as possible: Microsoft comes to the aid of the chip manufacturer by providing updates that do so, with Microsoft's own updates for Windows 10. Versions 1909 and 1903 of the OS will get updates that fix the vulnerabilities faster a... Read more

date4 years ago
Google introduces open-source two-factor authentication platform

Google introduces open-source two-factor authentication platform

Google has placed a new open source project on GitHub called OpenSK. It is a multifactor authentication platform that allows small businesses and hardware vendors to develop their own security keys. OpenSK appears to be an open-source counterpart to Google's Titan security key. OpenSK uses the p... Read more

date4 years ago
1 204 205 206 207 208 278