Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Thales may take over Gemalto from EU and Australia

Thales may take over Gemalto from EU and Australia

In a short space of time, both the Australian and European market watchdogs have given the green light for the acquisition of chip manufacturer Gemalto by Thales. There are, however, a number of conditions attached to this. The chance that the companies will actually merge is high by now. Press agen... Read more

date5 years ago
Huawei opens cybersecurity centre in Brussels

Huawei opens cybersecurity centre in Brussels

Huawei will open a transparency centre in Brussels next year. By doing so, the Chinese network supplier hopes to eliminate concerns about the safety of its products. The company announced this during a press conference at its headquarters in Shenzhen. The press conference of Huaweis rotating preside... Read more

date5 years ago

Cryptomining and IoT malware up 70 percent in the third quarter.

The digital underworld generated 480 new threats per minute in the third quarter of 2018. That's what the new McAfee Labs Threats Report of December this year says. Malware for the Internet of Things (IoT) increased by 73 percent, malware for cryptographic currency mines by 71 percent. "Cybercrimin... Read more

date5 years ago
“Intel wants to sell McAfee

“Intel wants to sell McAfee

Investor and venture capitalist Thoma Bravo has started discussions to acquire security company McAfee from TPG Capital and Intel. The talks have only just begun, but it seems that Thoma Bravo's bid is already much higher than the company's current value. That's what news agency Reuters reports on t... Read more

date5 years ago
Vulnerability in SQLite impacts thousands of apps

Vulnerability in SQLite impacts thousands of apps

A vulnerability in the popular SQLite database engine puts thousands of desktop and mobile apps at risk. The error, discovered by Tencent's Blade security team, allows an attacker to run rogue code on a victim's computer. That's what ZDNet reports. It is also possible to leak program memory with th... Read more

date5 years ago
Thousands of Jenkins servers vulnerable to takeovers and data theft

Thousands of Jenkins servers vulnerable to takeovers and data theft

Thousands, possibly more, of Jenkins' servers are vulnerable to data theft, takeovers or attacks aimed at cryptic currency miners. This is because hackers can take advantage of two different vulnerabilities, with which they can give themselves admin rights, or log in. Both vulnerabilities were disco... Read more

date5 years ago
Microsoft wants to use AI to predict whether PC will get malware

Microsoft wants to use AI to predict whether PC will get malware

Microsoft has launched a new challenge for data scientists on the crowdsourcing site Kaggle. Participants can win $25,000 by creating an algorithm that can predict which types of Windows computers are most likely to be infected with malware in the short term, reports ZDNet. The competition is held b... Read more

date5 years ago
In new spam mails is threatened with bombs

In new spam mails is threatened with bombs

A remarkable new spam campaign has been launched, aimed at countries in the western world. The hackers threaten to detonate a bomb, unless the recipient of the mail makes a payment in bitcoin. Bombs have so far not been found in the locations where they would be located. The message of the mails is ... Read more

date5 years ago
Global hack campaign focuses on nuclear and energy companies

Global hack campaign focuses on nuclear and energy companies

A global hack campaign called Operation Sharpshooter focuses on nuclear, defence, energy and financial companies. That's what McAfee says in a new report. The campaign has already infiltrated dozens of companies, mainly in the United States and other English-speaking countries. The hackers post rogu... Read more

date5 years ago
Hackers ramp up email spam attacks during holidays

Hackers ramp up email spam attacks during holidays

New research shows that hackers expand their activities during the holidays. Hackers send more spam, in the form of messages from postal workers and online shops, in the hope of gaining access to payment details of unsuspecting victims. This is shown by new research by security firm F-Secure Corp. T... Read more

date5 years ago
1 264 265 266 267 268 282