
Data breach at Dutch lab even bigger: potentially millions of victims
The data breach at Clinical Diagnostics appears to be even larger than initially thought. The Dutch Populatio...
The data breach at Clinical Diagnostics appears to be even larger than initially thought. The Dutch Populatio...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
The latest version of Microsoft's web browser has new encryption technology to protect users online. This ...
Trend Micro has announced a new security solution. Cloud One - Container Security aims to simplify applicatio...
A recent survey says that organizations forsake security concerns in the development of applications and APIs...
Users yet again turn out to be the weakest link in the security of computer systems. This is suggested by a s...
The change to a key setting is designed to limit the damage that an infection can cause in an enterprise sett...
DNS encryption offers some advantages but also brings risks if left to third party providers, according to th...
John Matze, the CEO of Parler says that the social media platform may never get back online after it was cut ...
In the last five years (perhaps more), macOS users have been targeted by a sneaky malware operation, which us...
This latest update is notable in helping admins defend against malware attacks. Microsoft has announced a ...
A crypto-mining botnet is using a malicious shell script to steal credentials not just for AWS but also Docke...