
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
JET engine vulnerabilities can crash Microsoft IIS and SQL Server
A team of researchers have detailed vulnerabilities in the JET database engine. Three researchers at Palo ...

New security portal from Juniper simplifies the step to SASE
Juniper has released Security Director Cloud. This is a portal to help enterprises extend their existing secu...

Critical vulnerabilities patched in Dell driver software, update now
There have been critical security problems in Dell's driver software for the past 12 years. These vulnerabili...

Okta Completes Acquisition of Auth0
Okta announced this week that it has completed its $6.5 billion acquisition of Auth0. The deal will combine t...

Experian suffers data breach due to faulty API
The fault has leaked the credit scores of almost every US citizen Experian, the major credit reporting com...

Microsoft finds security flaw in memory allocation code
BadAlloc Integer overflows affect things like IoT, OT, medical gear, leaving them vulnerable to hacks Micr...

Accenture acquires cybersecurity firm Openminded
Accenture has closed a deal with French cyber security company Openminded for an acquisition. With the acquis...

Palo Alto Networks Automatically protects unprotected VMs
Palo Alto Networks has announced several new features for Prisma Cloud. The most important of these is that t...

Law enforcement wipes out Emotet malware with self-destruct code
EU cops use a customized Windows library to cause the malware to erase itself Windows malware Emotet erase...

SentinelOne is the flight recorder for endpoint protection
To become truly successful in the crowded and competitive security market, you have to have a unique story. S...