Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Most ransomware victims face second attack after paying off first
Hackers in most cases will return to take a second bite at the apple. The COVID-19 pandemic has led to a w...
Hackers use new attack method to compromise HTTPS protocol
The ALPACA attack profile uses domain confusion to fool secure web servers. Researchers in Germany have id...
EU Commission takes legal action against the Belgian Government
The European Commission has started taking legal action over violations in privacy laws against Belgium. They...
EU agency: serious cyberattacks in Europe doubled over the past year
Cyber criminals took advantage of the pandemic to increase their activity CNN this week reported that sign...
Cisco’s Webex gaining new audience engagement capabilities
Cisco’s Webex Suite introduces some exciting updates after the acquisition of Slido s.r.o and Socio Labs In...
Palo Alto Networks updates Prisma Cloud CSPM, adds new detection capabilities
Palo Alto Networks introduced five new capabilities to the cloud security posture management of Prisma Cloud....
CyberArk expands Identity Security Platform with new services
During CyberArk Impact Live, CyberArk announced new enhancements to its Identity Security Platform. With this...
Datto upgrades virtual SIRIS to help combat ransomware
The new vSIRIS software aims to provide deployment flexibility to help business continuity and disaster recov...
Updated GitHub policies vow to eliminate exploitative code to protect against attacks
GitHub, the open-source platform for developers, has officially stated that they are updating their site's po...
Unit 42 from Palo Alto Networks finds the first Windows Container malware
Palo Alto Networks revealed that it discovered the first known malware targeting Windows containers. It ha...