Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Huawei accuses US government of illegal actions against workers

Huawei accuses US government of illegal actions against workers

The Chinese manufacturer Huawei has accused the American government of illegal actions against the company and its personnel. The accusations were made via Twitter. In his tweets, Huawei responds to a recent article by The Wall Street Journal, claiming that the manufacturer is being investigated by ... Read more

date5 years ago
Cybercriminals steal over 200,000 euros with AI voice manipulation

Cybercriminals steal over 200,000 euros with AI voice manipulation

A group of cybercriminals has managed to steal $243,000 (€222,000) by using artificial intelligence (AI) and voice technology. Using the technologies, they imitated a British entrepreneur. The fraud took place in March this year and was carried out by an unknown group of hackers. The news was ... Read more

date5 years ago
Social media apps greatest threat to enterprises

Social media apps greatest threat to enterprises

Social media apps bring with them most of the concerns of security professionals when it comes to potential network risks. That's what Gigamon's report says. Moreover, companies are not always aware of how many apps are actually on their network. According to the study, companies are at risk because... Read more

date5 years ago
Siemens launches industrial hosting platform for cyber security

Siemens launches industrial hosting platform for cyber security

Siemens has released a new version of the Ruggedcom APE (Application Processing Engine). Ruggedcom APE is an industrial hosting platform designed to use third-party software applications in difficult and mission-critical environments. The platform protects networks from cyber attacks. The new Rugged... Read more

date5 years ago

Fileless malware attacks up 265 percent

Fileless malware - where the necessary files for an infection are not installed on the system - is becoming increasingly popular. In the first half of this year, the number of infections with this malware increased by no less than 265 percent compared to the same period in 2018. Security company Tre... Read more

date5 years ago
Many companies don’t notice cyber attacks until it’s too late

Many companies don’t notice cyber attacks until it’s too late

According to Kaspersky Lab, many companies only notice that a cyber attack takes place when it is already too late. The companies only ask for help when money or data has already been stolen, or when devices have broken down. Kaspersky Lab states that in a new report, IT Pro writes. Half of the inci... Read more

date5 years ago
Botnet with million infected computers taken over

Botnet with million infected computers taken over

The French police have taken over and neutralised a large botnet for cryptographic currency mining. The botnet managed nearly a million infected computers. It was the Retadup malware, writes Techcrunch. This malware infects computers and then uses processor power to minimize cryptographic currency. ... Read more

date5 years ago
Mining malware switches from Arm-IoT to Intel servers

Mining malware switches from Arm-IoT to Intel servers

A mining malware previously only seen on Arm-controlled Internet or Things (IoT) devices has made the switch to Intel systems. That's what security investigator Larry Cashdollar of Akamai discovered. Cashdollar states that one of its honeypot systems has recently discovered an IoT malware that seems... Read more

date5 years ago
“Governments increasingly target of cyber-attacks.

“Governments increasingly target of cyber-attacks.

A new investigation by security company Positive Technologies shows that targeted cyber attacks are increasingly taking place with the aim of targeting governments. The research report investigated cyber attacks in the second quarter of 2019. Targeted cyber attacks are carefully prepared in advan... Read more

date5 years ago
1 215 216 217 218 219 277