
Memory-safe malware: Rust challenges security researchers
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Buying login data through the Genesis Store was, for a long time, largely possible through a malware strain c...
CrowdStrike has added enhanced support for Microsoft Azure, Google Cloud and containers in Crowdstrike Falcon...
BlackBerry has announced the next version of the BlackBerry Spark Platform. The next generation of the platfo...
According to FireEye, becoming a victim of a cyber attack is still common enough, but the company found that ...
Fortinet has made the new version of the FortiOS operating system generally available, version 6.4. The relea...
Not only versions of Microsoft Windows have security tools, including Threat Protection, Insider Risk Managem...
Dell will sell RSA Security to a group of investment firms led by Symphony Technology Group. The transaction ...
A warning from the U.S. government: tech giant Huawei would use a backdoor in Germany's network to listen in ...
RSA Security seems to disappear from Dell Technologies' portfolio after a few years. The security branch will...
A cloud database of cosmetics giant Estée Lauder was open to third parties for a long time, making the data ...