Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
How Split-Second Data Performance and Sovereignty Keep the Netherlands Moving
Dutch enterprises are combining open-source foundations with enterprise-grade support to deliver the split-se...
Databricks launches Data Intelligence for Cybersecurity
Unifying all data for security purposes. That is the task Databricks has set itself with Data Intelligence fo...
Chinese cyber threat exploited VMware vulnerability for a full year
Broadcom has patched the CVE-2025-41244 vulnerability. A good thing indeed as exploits had been occurring sin...
Check Point and Wiz launch integrated cloud security
Check Point and Wiz have expanded their collaboration to offer fully integrated cloud security. The combinati...
Akira ransomware strikes within an hour
Researchers at Arctic Wolf are sounding the alarm about a ransomware campaign that has been ongoing since Jul...
Jaguar Land Rover receives government guarantee to rescue suppliers after hack
The British government is guaranteeing a £1.5 billion loan to Jaguar Land Rover (JLR) to keep the supply cha...
Harrods hit by data breach, hackers make contact
430,000 customers of London luxury department store Harrods have had their data compromised in a data breach....
Malware in MCP server reveals fundamental security problem
A malware infection in postmark-mcp, a popular MCP server with 1,500 weekly downloads, highlights the lack of...
Why human-centric security cannot do without AI
In practice, hacking people often proves easier than directly attacking systems. The vast majority of cyberat...
Critical zero-day affects Cisco IOS and IOS XE
Cisco has disclosed a serious security vulnerability in IOS and IOS XE software that allows both denial of se...