
The state of security in 2025
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Cisco has disclosed two critical vulnerabilities affecting core data center equipment. The vulnerabilities all...
Microsoft has unveiled a new service called Azure Bastion, which should provide secure access to off-Internet ...
The Dutch employee is ready to say goodbye to the password this year. That's what the report "The Password-Fre...
ESET researchers have found apps that impersonate the Turkish BtcTurk crypto exchange, but in reality use new ...
A new decryption tool has been released that neutralizes the most recent file lock incarnations of GandCrab 5....
Check Point has launched a new tool that offers cloud-native threat protection and security intelligence. The ...
American chip manufacturers, including Qualcomm, Xilinx and Intel, would quietly put pressure on the American ...
Hackers are actively looking for systems to exploit with the dangerous Bluekeep vulnerability within Windows. ...
Barracuda Networks has added analytics to its next-generation firewall, which also includes SD-WAN capabilitie...
The US and Russia are accusing each other of hacking into the other's electricity networks or trying to do so....