
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Cisco fixes two critical vulnerabilities in Identity Services Engine
Cisco has fixed two critical vulnerabilities in its Identity Services Engine (ISE) that could allow an authen...

Phishing-as-a-Service increasingly accessible to cybercriminals
Phishing-as-a-Service (PhaaS) kits are becoming increasingly popular among cybercriminals. They allow malicio...

Microsoft addresses Windows vulnerability with PowerShell script
Microsoft recently rolled out a PowerShell script that addresses the 2023 BlackLotus Secure Boot vulnerabilit...

Dynatrace’s raft of updates: AIOps, CSPM, and more
During the annual Perform event in Las Vegas, Dynatrace announced a fleet of updates. The company has ambitio...

SailPoint targets valuation of 11.5 billion at IPO
Another Thoma Bravo success story?

CyberArk and SentinelOne join forces for better identity security
No identity crisis: stronger and better together

Amazon Redshift takes tougher measures against data exposure
Amazon Redshift is getting new security features by default that should make the popular data warehouse solut...

Microsoft blocks free app to bypass Windows 11 24H2 system requirements
Last October, media outlets wrote about a new third-party tool called Flyby11. That one allows users to bypas...

AI influences voter sentiment in at least a third of elections
Cyber attacks increasingly focus on influence operations and disinformation campaigns rather than direct infr...

Meta will not disclose high-risk and highly critical AI models
Meta has established new rules under which it will never disclose internally developed, potentially (very) hi...