Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

McAfee thinks about ‘combination’ with NortonLifeLock

McAfee thinks about ‘combination’ with NortonLifeLock

McAfee is considering a merger or partnership of some kind with NortonLifeLock, its direct competitor in the consumer antivirus software market, writes the Wall Street Journal. NortonLifeLock was created in November, after Broadcom took over Symantec's enterprise branch, including the brand name... Read more

date4 years ago
Sophos launches cloud tool to build safer applications

Sophos launches cloud tool to build safer applications

Sophos has made two new innovations available. The biggest innovation is SophosLabs Intelix, a cloud-based tool for secure apps. Cloud Optix will also be updated, to simplify cloud security. SophosLabs Intelix allows developers to make API calls to the cloud platform to assess the risk of files,... Read more

date4 years ago
AWS launches three new solutions for cloud security

AWS launches three new solutions for cloud security

Amazon Web Services yesterday announced three new solutions for cloud security. These are Amazon Detective, IAM Access Analyzer and Nitro Enclaves. Detective Amazon Detective needs to help security teams conduct faster and more effective threat research. With a few clicks on the AWS Manageme... Read more

date4 years ago
ESET has the expertise, but also a central position in Europe

ESET has the expertise, but also a central position in Europe

During the recent ESET Press Tour in Bratislava, we received an update about what the security company is currently doing and what the plans for the future are. Last year we were also present, and then, it turned out that the company had a clear vision about where it wanted to go in the future: to ... Read more

date4 years ago
New trojan gives attackers control over Windows systems

New trojan gives attackers control over Windows systems

A newly discovered trojan focuses on organisations in health care and education. It is a tailor-made, Python-based trojan that gives attackers control over Windows systems. This gives them the ability to control actions and steal sensitive data. The trojan gives hackers remote access, and is cal... Read more

date4 years ago

Microsoft develops programming language for secure coding

Microsoft is in the process of developing a programming language aimed at ensuring security. The company itself calls this 'safe infrastructure programming'. The programming language should become open-source in the foreseeable future. In project Verona, Microsoft aims to make Windows 10 safer f... Read more

date4 years ago
‘Attacks aimed at SMEs continue to increase’

‘Attacks aimed at SMEs continue to increase’

G DATA has released a number of predictions for 2020. This includes an increased use of automation in cyberattacks and more ransomware attacks on servers. The first prediction from G DATA is that criminals, like companies, will use more automation in the execution of their campaigns. This means ... Read more

date4 years ago
Botnet uses YouTube to mine cryptocurrency

Botnet uses YouTube to mine cryptocurrency

A pre-existing botnet has changed its behaviour by switching to cryptomining. To do this, it uses YouTube as part of its process. The change was discovered on Tuesday by ESET security researchers. The Statinko botnet, which has been active since 2012, was previously used as part of a large-scale... Read more

date4 years ago
Hackers mine Monero cryptic currency through Docker vulnerability

Hackers mine Monero cryptic currency through Docker vulnerability

A group of hackers is scanning the entire Internet to find vulnerabilities in certain systems that use enterprise sandbox software. They then use the vulnerabilities to minimise cryptographic currency, in this case the Monero cryptographic currency. According to security researchers at Bad Packe... Read more

date4 years ago
‘Security in 2020 revolves around AI and counter-espionage’

‘Security in 2020 revolves around AI and counter-espionage’

What will the security landscape look like in 2020? Fortinet's FortiGuard Labs team has made some predictions about this. According to the FortiGuard Labs team, next year's security landscape will be defined by artificial intelligence (AI) and counter-espionage. AI and counter-espionage can pla... Read more

date4 years ago
1 205 206 207 208 209 273