
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

U.S. watchdogs fining Equifax $700 million for hacking 2017
Equifax, an American credit bureau, is likely to be fined $700 million by several American watchdogs. The reas...

White House wants to talk to Intel, Google and Qualcomm about Huawei prohibition
Top people from various American tech companies have been invited to the White House to discuss the ban on tra...

Hackers share after burglary work of contractor Russian secret service
Hackers have managed to invade SyTech, a contractor of the Russian secret service FSB. The group has stolen in...
Researchers fool AI-based antivirus scanner
Australian cybersecurity researchers from Skylight Cyber have managed to mark an antivirus engine malware as s...

Low confidence in user data security among IT professionals
According to a study by BlackBerry, there is a very low level of trust among IT departments in the Western wor...

Sumo Logic launches threat benchmarking for Amazon Web Services
Sumo Logic launches a new Global Intelligence Service for Amazon GuardDuty, a Machine Data Analysis platform t...

Billion of fake ad impressions created by malware
Researchers have discovered a new type of malware that creates false ad impressions to generate fraudulent ad ...

800,000 systems still vulnerable to Bluekeep
Over 800,000 systems are still vulnerable to Bluekeep, states security company BitSight Technologies. This is ...

Phishing practices evolved: lateral phishing is latest threat
Barracuda reports on a new research in collaboration with the University of California (Berkeley and San Diego...

Companies are getting shadow IT under control more and more.
Companies are increasingly working to tackle shadow IT, according to research by Duo Security, which is part o...