
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
The small countries on the EU's eastern flank may be at risk due to the Ukrainian crisis, warns an EU Parliam...
TIS, the Telefónica Group company that pioneered integral technological security, has implemented a new solu...
Google launches Checks, a platform that helps organizations deliver secure and privacy-compliant apps. The pl...
Ransomware remains king, the manufacturing industry is its biggest target and Linux malware has taken off. To...
The growing tsunami of application-specific and web-application threats continues to be a challenge for globa...
Beyond Identity raised over 88 million euros ($100 million) in a C-series investment round. The passwordless ...
Xenomorph has infected at least 50,000 Android devices. The banking trojan steals login data to plunder victi...
SentinelOne and Zscaler will integrate their zero trust and XDR services. Ultimately, the integration should ...
Ransomware has been on the radar of many security professionals for years. After all, ransomware is one of th...
The state sponsored TunnelVision group exploits critical Log4j flaw to infect targets with ransomware. Hac...