Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
“The Netherlands is significantly more affected by malware than Belgium.
The Netherlands is more affected by malware than Belgium, according to G DATA on the basis of a half-yearly an...
Thales and Gemalto get permission to acquire in the US
Thales and Gemalto have obtained approval from the Committee on Foreign Investment in the United States (CFIUS...
Kaspersky comes up with cloud service Security Cloud
Kaspersky Lab announces the Kaspersky Security Cloud, a service for consumers that allows them to scale up sec...
“A quarter of top people see investment in security as a negative ROI.
More than a quarter of the top people, 27 percent, think that investments in security have a negative return o...
Schneider Electric sold USB sticks that may contain malware
Schneider Electric has shipped USB sticks that may contain malware. These USB sticks were shipped with Conext ...
380,000 payment cards stolen at hack on British Airways
A hack on British Airways put 380,000 payment cards at risk. The hack took place between 21 August and 5 Septe...
New Fortinet solution FortiNAC provides overview and grip on IoT devices
Fortinet has made the new FortniNAC solution available. It is a network access controller that combines networ...
Google wants to get rid of the URL completely
Uniform Resource Locators (URLs), the online addresses that are a bit like one of the most important ways of s...
Man remains the weakest link in any security system
People remain the weak link in any security system. A new investigation has shown that the vast majority of se...
“Nearly 400,000 websites are at risk of hacking through open .git folders.
According to Czech security researcher VladimÃr Smitka, almost 400,000 websites are at risk of being hacked...