Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Palo Alto Networks expands cloud security with RedLock acquisition

Palo Alto Networks expands cloud security with RedLock acquisition

Palo Alto Networks announces that it has reached an acquisition agreement with RedLock. The cloud security specialist is recruited by Palo Alto for $173 million. RedLock specializes in security for customers who work with a public cloud, such as Amazon Web Services or Microsoft Azure. The company ha... Read more

date6 years ago
New Splunk solutions make detecting cyber attacks easier

New Splunk solutions make detecting cyber attacks easier

Splunk has announced new innovations to its security portfolio to help security teams detect and investigate cyber-attacks more easily and quickly. The solutions have new functions such as security automation, orchestration and response (SOAR), the Use Case Library and Event Sequencing. The company'... Read more

date6 years ago
Researchers find 12.5 million unprotected business mailboxes

Researchers find 12.5 million unprotected business mailboxes

More than 12 million email archive files are accessible due to misconfigured rsync, FTP, SMB, S3 bucket and NAS. That's what Digital Shadows says after investigating the methods used by cybercriminals to access business e-mail. The security company therefore indicates that the malicious parties do n... Read more

date6 years ago

Americans carry out test with SMS alarm system

Last Wednesday, millions of Americans received something similar to a text message from President Donald Trump. The message was sent at 14:18 as part of a test of the Integrated Public Alert and Warning System, a system maintained by FEMA and the Federal Communications Commissions. A FEMA representa... Read more

date6 years ago
British government: Russian secret service distributed ransomware

British government: Russian secret service distributed ransomware

The British National Cyber Security Centre reports after investigation that the Russian military secret service - the GROe - is behind a series of cyber attacks. According to the British Government, this is an attempt by the Russian Government to undermine the democratic process of Western countries... Read more

date6 years ago
Google Project Zero: slow patches Linux are dangerous for users

Google Project Zero: slow patches Linux are dangerous for users

The developers of Ubuntu and Debian receive a warning from Googles Project Zero. Project Zero researcher Jann Horn, who found the Meltdown and Spectre bugs, calls on them to update their Linux distros more quickly. Otherwise, users will be exposed to threats for an unnecessarily long time. According... Read more

date6 years ago
Hackers focus again on developers of Google Chrome extensions

Hackers focus again on developers of Google Chrome extensions

Developers of extensions for Google Chrome are the newest target of hackers. It seems that hackers are trying to get developers to surf to a phishing site, where they can then steal their login details. The ZDNet site reports this today on the basis of its own research. The hackers want the login c... Read more

date6 years ago
American Secret Service: ATMs are being tapped more and more often

American Secret Service: ATMs are being tapped more and more often

The US Secret Service warns banks of a new series of incidents when it comes to ATMs. According to the secret service, more and more ATMs are being tapped. Malicious parties have to follow a number of steps, which can still be quite complicated. Krebs on Security received a copy of the letter that t... Read more

date6 years ago
1 271 272 273 274 275 278