Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
‘Multistage ransomware attacks are becoming increasingly dangerous’
Multistage ransomware attacks on vital infrastructure providers are becoming more dangerous and frequent, acc...
Working from home poses great risk to company data and systems
Working from home has a significant impact on the risks to which company systems and sensitive data are expos...
Gitlab acquires Peach Tech and Fuzzit to expand DevSecOps platform
GitLab acquires software developer Peach Tech and fuzz testing vendor Fuzzit. With these acquisitions, Gitlab...
Security experts urge Windows 10 update due to ‘wormable’ bug
Homeland Security advises Windows 10 users to install the latest version of the operating system as soon as p...
Zscaler acquires security specialist Edgewise Networks
Zscaler acquires American security specialist Edgewise Networks for an undisclosed amount. Edgewise provides ...
WatchGuard completes acquisition of Panda Security
US security company WatchGuard Technologies has completed the acquisition of Panda Security. Panda is a speci...
Remote working creates security problems for organisations
Many companies have inadequate security measures in place to support remote workers. This is revealed in the ...
Akamai introduces AI tool against malicious website scripts
Akamai introduces the AI-based Page Integrity Manager tool to help companies discover malicious code on their...
Chrome: ’70 percent of vulnerabilities are caused by memory issues’
The majority of critical vulnerabilities in Google Chrome are attributed to faulty memory usage, Google techn...
Box upgrades Device Trust to improve zero-trust access
Box updates its Device Trust service to help customers enforce zero-trust policies. Device Trust 2.0 is avail...