
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Sophos introduces ZTNA for secure user and device connections
Sophos is introducing a Zero Trust Network Access (ZTNA) portfolio. Zero trust principles and far-reaching in...

Critical Linux vulnerability affects all major distributions
Security researchers have found vulnerabilities in Linux PolicyKit (also known as Polkit). The vulnerabilitie...

Log4J hackers continue targeting VMware Horizon servers
VMware is rushing to convince customers to apply the latest security guidance. According to several cybers...

Microsoft finds a new SolarWinds vulnerability during Log4j research
A Log4j investigation led Microsoft to a new vulnerability related to the infamous SolarWinds attack of 2020....

WordPress plugins from AccessPress Themes have backdoors for hackers
Security specialist Jetpack discovered backdoors in legitimate WordPress plugins from AccessPress Themes, a W...

Deloitte chooses Exabeam for XDR/SIEM capabilities in MXDR
Deloitte has chosen Exabeam for their XDR and SIEM capabilities of their new MXDR offering, which we reported...

Google launches anti-phishing alerts in Google Drive
Google will now warn of phishing, malware and ransomware when opening files in Google Drive. Google Drive ...

Deloitte launches Managed Extended Detect and Response platform
Deloitte has finally launched its latest threat detection and response platform, MXDR (Managed Extended Detec...

Data of half a million people at risk in hack on Red Cross
An enormous hack has hit the International Committee of the Red Cross (ICRC). The personal data of as many as...

Zoom was vulnerable to buffer overflows and memory leaks
Project Zero found two vulnerabilities in Zoom, which have since been patched. Clients of users were found to...