Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Oracle update covers large amount of security flaws

Oracle update covers large amount of security flaws

Oracle has rolled out a large number of security updates across its range of products. A total of 334 security issues were addressed by the updates. The updates are spread across 93 products in the company's portfolio. For example, there are updates for Database Server, which addresses 12 securi... Read more

date4 years ago
Microsoft discovers malicious npm package

Microsoft discovers malicious npm package

Microsoft has discovered a malicious npm package that steals data from Unix systems. The npm (Node Package Manager) security team for JavaScript has taken the malicious package off the air. The malicious package is called 1337qq-js and was uploaded to the npm repository on December 30th. The pac... Read more

date4 years ago
Thousands of British passports exposed through AWS database

Thousands of British passports exposed through AWS database

An unsecured Amazon Web Services database has exposed thousands of British passports, visible in scans. In addition, tax documents and job applications were also visible. It's not yet clear who left the database exposed. Two security researchers, Noam Rotem and Ran Locar, discovered the flaw whi... Read more

date4 years ago
Microsoft patches large vulnerability in Windows 10

Microsoft patches large vulnerability in Windows 10

Microsoft has fixed a large vulnerability in Windows. The vulnerability was discovered by the American National Security Agency (NSA). The problem was officially called CVE-2020-0601. It affected Windows 10, Windows Server 2016, 2019 and Server version 1803. The error was described as a crypto l... Read more

date4 years ago
Citrix ADC and Citrix Gateway waiting for patch after December leak

Citrix ADC and Citrix Gateway waiting for patch after December leak

In December, a major security breach came to light in the Citrix Application Delivery Controller (Citrix ADC) and Citrix Gateway, formerly known as NetScaler Gateway. We are still waiting for a patch, while researchers are now warning that cyber criminals are actively looking for vulnerable Citrix ... Read more

date4 years ago
Cloudfare for Teams announced after acquisition of S2 Systems

Cloudfare for Teams announced after acquisition of S2 Systems

According to their own words, there were more interested parties for acquiring the startup S2 Systems, but Cloudfare pulled the long straw: S2 Systems, specialised in isolating browser environments, was added to the portfolio. The acquisition will be announced at the same time Cloudfare for Team... Read more

date4 years ago
IBM makes SysFlow open-source in fight against cloud threats

IBM makes SysFlow open-source in fight against cloud threats

IBM's research department has announced that SysFlow, a toolkit for combating vulnerabilities in cloud environments, is now available as an open source kit. SysFlow should simplify searching through data in order to find out where something is happening, which is quite a challenge for security t... Read more

date4 years ago
CrowdStrike offers future-proof cloud-native security

CrowdStrike offers future-proof cloud-native security

CrowdStrike is a provider of cloud-native endpoint security and is purely focused on B2B. Since 2011 the American company has grown explosively. We spoke with Ronald Pool, Cyber Security Specialist at CrowdStrike, and got a glimpse of what the company is doing. Not only does CrowdStrike focus on en... Read more

date4 years ago
Google Project Zero now waits 90 days with announcing vulnerability

Google Project Zero now waits 90 days with announcing vulnerability

From now on, software developers no longer have to fear that their users will have too little time to carry out an update that resolves a vulnerability. From now on, Google Project Zero will use a fixed number of days (ninety) before it reports that a defect has been found. Previously, Project Z... Read more

date4 years ago
Half of industrial companies ill-equipped for cyber attack

Half of industrial companies ill-equipped for cyber attack

No less than half of industrial companies are not well prepared for possible cyber attacks. This is evident from a study that Fortinet commissioned from Forrester Consulting. Due to increasing digitisation, these companies are more vulnerable than ever. The companies recognise the importance of ... Read more

date4 years ago
1 206 207 208 209 210 278