
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

F-Secure introduces WithSecure brand for its corporate security business
F-Secure announces the new brand name WithSecure. It's the new name for the branch of F-Secure that focuses o...

Noname Security and iSOC24 team up to secure APIs
API Security company Noname Security is going to collaborate with Dutch company iSOC24. With this collaborati...

HubSpot was hacked, data of companies leaked
HubSpot has been hit by a hacking attack. Hackers managed to steal data from about 30 customers. Especially c...

Authentication specialist Okta possibly hacked
The Lapsus$ group may have hacked Okta. The authentication provider confirms that it is investigating the hac...

White House warns US businesses about possible Russian hacking attacks
The White House has issued a warning to businesses that Russia may be preparing cyberattacks against key infr...

Zscaler expands Zero Trust Exchange with Zero Trust Network Access
Zscaler expands security platform Zero Trust Exchange (ZTE) with three Zero Trust Network Access solutions. P...

STG launches Skyhigh Security
The McAfee Enterprise offshoot offers an SSE portfolio that includes SWG, CASB, ZTNA, and more. Symphony T...

Criminal group Lapsus$ lays claim to cyberattack on Microsoft
Lapsus$ claims to have access to the developer account of a Microsoft employee. Last month, the ransomware gr...

Leaked ransomware documents show Conti is helping Putin
The hacker group works on behalf of Russia on an ad hoc basis. A cache of 60,000 leaked chat messages and ...

Best Endpoint Security Software 2022
Implementing endpoint security best practices is crucially important in times when a remote working culture h...