
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Mozilla adds second DNS over HTTPS service to Firefox
NextDNS becomes the second DNS-over-HTTPS (DoH) provider in Firefox, after Cloudflare. With DoH, Internet use...

Google Cloud adds integrations for better security
Google has announced a number of integrations between Google Cloud and several popular cyber security tools. ...

Windows vulnerability abused to launch targeted attack
A new zero-day vulnerability (CVE-2019-1458) in Windows, discovered by antivirus company Kaspersky, has been ...

‘Cyber-attacks occur more and more at the hardware level’
Dell EMC warns that hackers are increasingly trying to penetrate at hardware level. That's what ITproportal w...

ISC² provides universal cybersecurity certificates
ISC² presents itself as the largest non-profit cybersecurity membership association in the world. The organi...

Mobile malware wriggling towards top cyber threats
A rare event, albeit not a positive one: For the first time in three years, a mobile trojan has been able to ...

Phishing campaign hits government agencies worldwide
Researchers from cybersecurity company Anomali have discovered a large-scale phishing campaign against intern...

G DATA broadens focus: a combination of people and technology
G DATA is known by many as a supplier of antivirus software, but the company is currently working to change t...

‘Too much security software actually creates weakness’
Some companies buy too much new security software, which gives their security teams little space to do their ...

Fragile data on Intel chips can be stolen using electricity
Cybersecurity researchers have discovered an error in recent Intel chips that allows a criminal to penetrate ...