
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Security Report: Web app attacks are up 800% compared to 2019
All categories of attacks have increased as hackers adapt their tactics to the pandemic world. CDNetworks,...

Drupal sites are vulnerable to a hacking trick popular in the 90s
The team that makes the Drupal CMS (Content Management System) has released security updates to fix a critica...

‘China-sponsored hacker group attacks companies worldwide’
A hacker group allegedly sponsored by the Chinese Government has attacked a large number of companies around ...

FireEye acquires Respond Software
Security company FireEye has announced that it has made a deal for the acquisition of Respond Software. FireE...

Tanium announces IBM collaboration
Security company Tanium has announced a collaboration with IBM. The companies will jointly introduce a securi...

Google introduces DDoS protection for Cloud customers
Google has announced Cloud Armor Adaptive Protection. The service uses technologies such as machine learning ...

Palo Alto Networks unveils new native 5G security offering
New offering will enable service providers and Enterprises to create new revenue streams while securing 5G. ...

AWS launches AWS Network Firewall to protect VPCs
Move signals Amazon's expansion into the cybersecurity sector. AWS this week expanded its presence in the ...

Microsoft developing successor to Trusted Platform Module
Microsoft is working on a new chip to protect the security keys used by a machine. The so-called Pluton chip ...

Hackers use cloud services to enhance their flexibility and speed
Are underground cloud services a thing Well, they are quite real, and criminals are taking advantage of their...