
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Trend Micro investigates possible sale after poor stock market figures
Trend Micro is exploring a possible sale. This move is a reaction to the interest in a buyout of several part...

SentinelOne and Google Cloud deepen partnership towards autonomous security
Integrations between security vendors are crucial to getting organizations' cyber resilience right. SentinelO...

State-sponsored hackers like to set up shop in legitimate cloud services
A safe place for everyone, including criminals

Rubrik and Mandiant join hands to secure backups
Security company Rubrik is integrating threat detection technology from Mandiant into its backup solutions. T...

Cybersecurity challenges keep CISOs awake at night
Decisions made by other C-level executives wind up at their doorstep

One expected input field too many was reason for Crowdstrike BSOD
21 input fields and only 20 inputs resulted in 8.5 million system crashes

Fortinet keeps a closer eye on document abuse with acquisition of Next DLP
Fortinet acquires Next DLP, strengthening its SASE solution. Next DLP's solutions give organizations insights...

Vectra AI updates platform to detect risks in hybrid infrastructure
Vectra AI Platform is being expanded. Through the latest update of Attack Signal Intelligence, SOC teams are ...

Check Point adds a nice big dose of AI to its platforms
Tackling GenAI with GenAI

Hackers attack Windows and Mac via malicious software updates
Hackers have succeeded in attacking Windows and Mac systems via software updates distributed through insecure...