
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Extension for management of crypto-keys steals data
According to researchers, an extension for Google Chrome that should make it easier for owners of multiple cr...

Microsoft takes over domain names from hackers linked to North Korea
Microsoft has acquired fifty domain names linked to a North Korean hacker group. The action has been taken ag...

‘Dell contemplates full Secureworks acquisition’
According to sources, Dell Technologies is considering buying the remaining shares of cybersecurity company S...

‘More and more companies pay after ransomware attack’
As the number of ransomware attacks continues to grow, more and more organisations are actually paying cyberc...

Email attacks are source of stress for security professionals
Security professionals in Europe experience a high workload due to e-mail attacks. Investigating their fraudu...

F5 Networks acquires Shape Security to improve app security
F5 Networks, specialist in network traffic management, is taking over Shape Security for approximately 1 bill...

New ransomware strain encrypts data after stealing it
A ransomware strain from the Zeppelin group can steal data and then encrypt it. Many forms of ransomware, onl...

Google blocks ‘less secure apps’ for G Suite from June 2020
Apps that ask for your G Suite account username and password, to sign in directly to your G Suite-account, wi...

Former Palo Alto worker prosecuted for insider trading
A former network administrator of cybersecurity company Palo Alto Networks, as well as four of his friends, a...

Google unveils framework for cloud-native security
In a new white paper, Google explains how it keeps its cloud-native architecture safe within the organisation...