Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Proofpoint advances threat management with ObserveIT acquisition

Proofpoint advances threat management with ObserveIT acquisition

Proofpoint has announced it’s acquired ObserveIT, the insider threat management platform, for $225 million in cash. The agreement will officially close later this year subject to conditions including Hart-Scott-Rodino merger review. The acquisition is seen by Proofpoint as an investment into f... Read more

date4 years ago
‘Companies want to replace VPN with Zero Trust Network Access’

‘Companies want to replace VPN with Zero Trust Network Access’

There are several possibilities on the market to make remote working possible. One of these is the virtual private network, or VPN. This solution is now widely used, but now also comes with risks. Companies want to get rid of VPNs, according to research by Zscaler. Companies increasingly prefer ... Read more

date4 years ago
BlueKeep vulnerability in Windows is getting abused

BlueKeep vulnerability in Windows is getting abused

Security researchers have spotted attacks utilising BlueKeep. BlueKeep is a vulnerability in older versions of Microsoft's Remote Desktop Protocol (RDP). The error was discovered in the May 2019 Patch. However, the biggest fear people had regarding BlueKeep does not seem to have come true for th... Read more

date4 years ago
ExpertExpert talks Ignore DNS at your peril 

Ignore DNS at your peril 

Businesses have to pay close attention to their web traffic, especially when migrating business applications to the cloud. Obviously, web traffic is vital to any organization. And, the perception of internal and external users regarding the security and performance of business applications or e-com... Read more

date4 years ago
New TLS protocol advances web security

New TLS protocol advances web security

Facebook, Cloudflare and the Mozilla Foundation have been collaborating to advance Transport Layer Security (TLS). Strengthening web security Individually, the companies released updates regarding security protocol Delegated Credentials. The new TLS protocol aims to strengthen web security an... Read more

date4 years ago
Office 365 phishing campaign uses fake voicemails

Office 365 phishing campaign uses fake voicemails

Cybercriminals are constantly finding new ways to steal data from victims. For example, a new phishing campaign uses fake voicemail messages to convince targets to surrender their Office 365 credentials. The campaign was discovered by McAfee security researchers, reports SiliconAngle. The cam... Read more

date4 years ago
‘Cybersecurity AI algorithms should become publicly available’

‘Cybersecurity AI algorithms should become publicly available’

Algorithms and methodologies for artificial intelligence (AI) and machine learning are becoming increasingly important in cybersecurity. However, more cooperation between the various stakeholders is needed in order to unlock the full potential of these technologies. By placing them in a public AI F... Read more

date4 years ago
WhatsApp sues Israeli company for spying on users

WhatsApp sues Israeli company for spying on users

In May this year, WhatsApp was found to contain a vulnerability that allowed users to be eavesdropped on. Spyware from the Israeli company NSO Group was used for this purpose. The chat app has now taken the NSO Group to court because of the practices. The NSO Group's spyware was found to be inst... Read more

date4 years ago
Bitdefender NTSA now also detects attacks using DNS services

Bitdefender NTSA now also detects attacks using DNS services

Bitdefender's Network Traffic Security Analytics (NTSA) solution can now also recognize attacks that use DNS and FTP services. This is possible because of the fact that the NTSA solution now includes machine learning algorithms for this purpose. Bitdefender NTSA is a solution that allows compani... Read more

date4 years ago
‘Chinese hackers most active worldwide’

‘Chinese hackers most active worldwide’

CrowdStrike reports that hackers working for the Chinese government are the most active worldwide. The company's most recent OverWatch research report states that hackers from China are as active as hackers from Russia, Vietnam, Iran and North Korea combined. According to CrowdStrike, the Chines... Read more

date4 years ago
1 212 213 214 215 216 277