Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Microsoft Azure Sphere publicly available next year

Microsoft Azure Sphere publicly available next year

Azure Sphere, a Linux-based microcontroller (MCU) and associated cybersecurity service, will become generally available in February 2020. Microsoft announced this during the IoT Solutions World Congress. Azure Sphere was earlier called Project Sopris. With this project, Microsoft wanted to devel... Read more

date4 years ago
‘Older employees are more responsible about cyber security’

‘Older employees are more responsible about cyber security’

A study by NTT shows that employees over the age of 30 are more inclined to handle cyber security carefully than their younger colleagues. The study examined the behaviour of employees on the basis of seventeen criteria. Employees under the age of 30 achieved a score of 2.3, while employees betw... Read more

date5 years ago
Armor and Rackspace collaborate for better hybrid cloud security

Armor and Rackspace collaborate for better hybrid cloud security

Rackspace and Armor have announced that they will work together to deliver better security for hybrid cloud environments. To this end, Armor Anywhere will be integrated into Rackspace's security services portfolio, for large private and hyperscale public clouds. Armor is a global provider of cl... Read more

date5 years ago
BlackBerry secures mobile devices on the fly

BlackBerry secures mobile devices on the fly

More and more mobile devices are appearing in the networks of large companies and organizations. With Unified Endpoint Management (UEM), administrators try to manage and secure this flow of devices as well as possible. With artificial intelligence (AI) and the use of machine learning this can be a ... Read more

date5 years ago
Linux vulnerability allows hackers to attack devices through wi-fi

Linux vulnerability allows hackers to attack devices through wi-fi

The Linux kernel has been found to contain an error, which provides hackers with the opportunity to crash devices using Realtek's WiFi chips. In some cases, it is also possible to take over devices. The error has existed for 6 years, until now. The vulnerability is located in the RTLWIFI driver,... Read more

date5 years ago
Chrome 77 protects against password and data theft

Chrome 77 protects against password and data theft

In 2018, Google launched Site Isolation in Chrome 67 to protect against the Spectre leak. This feature uses operating system processes to make it more difficult for attackers to steal data from other websites. This feature can stop even more advanced attacks in the new Chrome 77. Spectre is an e... Read more

date5 years ago
Thoma Bravo acquires Sophos

Thoma Bravo acquires Sophos

Sophos will most likely be in the hands of Thoma Bravo soon. The company has, in fact, received a takeover bid from the American private equity company of USD 7.40 per share. This amounts to a total of approximately 3.9 billion dollars (3.53 billion euros). The board of directors will unanimousl... Read more

date5 years ago
With DynamicScale, Okta focuses on apps with a lot of traffic

With DynamicScale, Okta focuses on apps with a lot of traffic

E-commerce websites and enterprise applications sometimes have to handle a lot of traffic, but are not always able to do that. Cyber security vendor Okta has updated its Identity Cloud solution to make this possible. With the Identity Cloud, companies can manage access to their systems. If a use... Read more

date5 years ago
Juniper Threat Labs discovers new malware

Juniper Threat Labs discovers new malware

Juniper Threat Labs has discovered a new Trojan that spreads spyware. The spyware uses Telegram to get stolen information. By using Telegram as a Command and Control (CnC) channel, the malware has the potential to infect the devices of some 200 million active users every month. The malware is ca... Read more

date5 years ago
REvil ransomware is recruiting distributors

REvil ransomware is recruiting distributors

The ransomware known as Sodinokibi, also known as REvil, is setting up a team of 'all-star affiliates', criminals who distribute the ransomware for a share of the profits. The Sodinokibi Ransomware was discovered at the end of April, when it tried to enter vulnerable WebLogic servers. Experts a... Read more

date5 years ago
1 213 214 215 216 217 277