
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

IBM SASE service aims for zero-trust security for enterprises
IBM has unveiled a new enterprise-level Secure Access Service Edge (SASE) solution designed to encourage adop...

Microsoft warns thousands of cloud customers of exposed databases
The Microsoft Azure Cosmos DB could have been exposed for years, experts say. Microsoft has warned thousan...

Rackspace Technology unveils Elastic Engineering for better security
A "dedicated pod of security experts" will operate as an extension of customer teams to solve complex securit...

Tech giants promise Biden massive new cybersecurity investments
Following a meeting at the White House, Google, Amazon, Apple, Microsoft, and IBM promise to increase cyber s...

Elastic acquires build.security to gain authorization policy management capabilities
Less than a year after it raised $6 million on seed funding, build.security is being acquired by Elastic. The...

Hacker behind $600-million heist of Poly Network’s assets has returned the stolen crypto
Poly Network, the cross-chain decentralized finance platform provider, had about $600 million cryptocurrency ...

Cisco says it will not patch a critical vulnerability in its older routers
A critical flaw in older Cisco Systems routers will not be patched after the company advised users that they ...

GitHub is transitioning users to 2FA
GitHub users are urged by the platform to enable two-factor authentication, as it seeks to change how account...

FirEye Mandiant discovers vulnerability in security cameras
A flaw in internet-connected security cameras can allow attackers to remotely watch what is recorded and brea...

Don’t make cybersecurity the end user’s problem
Human beings are the weakest link in the chain of cybersecurity, you often hear. Roel van Rijsewijk from Thal...