
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Microsoft will fix leak in Internet Explorer on February 11th
A critical security vulnerability has been found in Internet Explorer (IE). By exploiting this leak, criminal...

Citrix makes patches available for critical leaks
This morning, Citrix released the first patches for Citrix Application Delivery Controller (Citrix ADC) and C...

Oracle update covers large amount of security flaws
Oracle has rolled out a large number of security updates across its range of products. A total of 334 securit...

Microsoft discovers malicious npm package
Microsoft has discovered a malicious npm package that steals data from Unix systems. The npm (Node Package Ma...

Thousands of British passports exposed through AWS database
An unsecured Amazon Web Services database has exposed thousands of British passports, visible in scans. In ad...

Microsoft patches large vulnerability in Windows 10
Microsoft has fixed a large vulnerability in Windows. The vulnerability was discovered by the American Nation...

Citrix ADC and Citrix Gateway waiting for patch after December leak
In December, a major security breach came to light in the Citrix Application Delivery Controller (Citrix ADC)...

Cloudfare for Teams announced after acquisition of S2 Systems
According to their own words, there were more interested parties for acquiring the startup S2 Systems, but Cl...

IBM makes SysFlow open-source in fight against cloud threats
IBM's research department has announced that SysFlow, a toolkit for combating vulnerabilities in cloud enviro...

CrowdStrike offers future-proof cloud-native security
CrowdStrike is a provider of cloud-native endpoint security and is purely focused on B2B. Since 2011 the Amer...