
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Security company Forescout acquired for 1.9 billion
Forescout has approved an acquisition by investment companies Advent International and Crosspoint Capital Par...

Palo Alto Networks wants to be the central point for corporate networks
Palo Alto Networks is developing as a company to take a more dominant role in the market. The cybersecurity v...

Vulnerability in Gigabyte driver used for ransomware attack
A no longer used Gigabyte driver has been discovered, with a digital signature, which can still be used to fu...

Accelerated cloud adoption leads to misconfigurations
According to new research by Palo Alto Networks, cloud misconfigurations often occur due to poor 'security hy...

‘Free’ movies popular as a phishing and malware tool
'Click here to see Joker for free', that's how users recently have been tempted to click on a link. They are ...

More than half a million PCs affected by malware hosted on Bitbucket
Bitbucket, the git-code hosting service, has been abused by hackers. As a result, some 500,000 computers worl...

Ekans-ransomware targets industrial control systems
Cybercriminals have launched ransomware attacks specifically targeting Industrial Control Systems (ICS). Acco...

Tanium cybersecurity goes beyond Unified Endpoint Management
Within the cybersecurity market, most experts agree that it is time for a new way of working. The number of t...

‘Shadow IoT major threat to corporate networks’
Infoblox publishes a new study this week that points to a significant threat to corporate networks by the Sha...

Hackers use smart-control of buildings for DDoS attacks
A vulnerability that allows even 'inexperienced hackers with little expertise' to access the smart-control of...