Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Broadcom sells part of Symantec to Accenture

Broadcom sells part of Symantec to Accenture

Broadcom has announced the sale of Symantec's Cyber Security Services to consultancy giant Accenture. The chip manufacturer took over Symantec's entire business divisionin August last year and is now divesting part of it. Broadcom paid 10.7 billion dollars (9,6 billion euros) for Symantec's bus... Read more

date4 years ago
Firefox 72 blocks ‘fingerprint scripts’ by default

Firefox 72 blocks ‘fingerprint scripts’ by default

With Firefox 72, Mozilla focuses primarily on ensuring the privacy of browser users. The most important feature that the update brings is the standard blocking of fingerprint scripts that collect data without permission. At the end of last year, Mozilla already announced that it wants to prohibi... Read more

date4 years ago
Security company Mimecast acquires Segasec

Security company Mimecast acquires Segasec

Cybersecurity company Segasec, based in Tel Aviv, has a new owner since Wednesday. Mimecast, the company specialising in e-mail security, is taking over the Israeli operation for some forty million dollars. With the purchase of Segasec, Mimecast adds the second Israeli cyrus security start-up to... Read more

date4 years ago
Infoblox is committed to AI to further develop DNS security

Infoblox is committed to AI to further develop DNS security

Anyone who follows the developments around the Domain Name System (DNS) knows that the market is changing a lot. Not only have newer standards such as DNS over TLS (DoT) and DNS over HTTPS (DoH) been added to make DNS traffic safer, new players have joined, and older players have left. For Infoblox... Read more

date4 years ago
Google Play Apps found that exploit vulnerability to steal data

Google Play Apps found that exploit vulnerability to steal data

According to researchers, a vulnerability in Anroid's kernel is used by three apps from the Google Play Store to access a user's phone. According to the researchers, the hacking group SideWinder is behind the apps. The now removed Camero app would make use of the vulnerability CVE-2019-2215, whi... Read more

date4 years ago
Iranian cyber attack on US government website launched

Iranian cyber attack on US government website launched

A group of Iranian hackers has taken down an American government website and have left a message claiming that they work for the Iranian state. The tensions between the US and Iran are now shifting to the cyber world as well, as the hackers claim retaliation for the death of the Iranian general Sol... Read more

date4 years ago
FBI wants to protect companies from hackers using obfuscated data

FBI wants to protect companies from hackers using obfuscated data

In an effort to better protect companies against actions by hackers or malicious own staff, the FBI changes its strategy to take action only after an attack has taken place. A more active attitude should improve security. Not only does the FBI contact companies when information is gathered that ... Read more

date4 years ago
Extension for management of crypto-keys steals data

Extension for management of crypto-keys steals data

According to researchers, an extension for Google Chrome that should make it easier for owners of multiple crypto-wallets to manage them, turns out to run off with those keys. In a twitter post, Harry Denley, security director at MyCrypto, states that an app called Shitcoin Wallet can be dangero... Read more

date4 years ago
‘Dell contemplates full Secureworks acquisition’

‘Dell contemplates full Secureworks acquisition’

According to sources, Dell Technologies is considering buying the remaining shares of cybersecurity company Secureworks, a report by Bloomberg shows. Sources state that Dell is interested in buying the remaining 13.8 percent of Secureworks' shares. This would mean that the company would become f... Read more

date4 years ago
1 207 208 209 210 211 278