Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Zscaler acquires Red Canary for AI-driven security operations
Zscaler has signed a definitive agreement to acquire Red Canary. The zero-trust player wants to strengthen it...
Microsoft surprises with emergency patch KB5061977 for Windows 11 24H2
On May 27, Microsoft unexpectedly released the out-of-band update KB5061977 for Windows 11 version 24H2. This...
Check Point acquires Veriti for automated real-time patching
Check Point acquires Veriti to expand its Infinity Platform with automated threat exposure management. The ac...
Windows 11 will feature cryptography that can withstand quantum computers
Microsoft is preparing Windows 11 for a new major threat to cybersecurity: quantum computers. In a blog p...
“Hack on LockBit may lead to a more dangerous threat landscape”
The hacks on ransomware groups LockBit and Everest seem like a positive development, but according to Orange ...
Arctic Wolf aims to reduce the cost of cyber incidents by up to 70 percent
Organizations should be able to save up to 70 percent on cyber incidents. This would be possible with Arctic ...
Trend Micro keeps an eye on today’s and tomorrow’s threats
During the Trend Micro World Tour held in Rotterdam, the diversity of the security company's offering became ...
TikTok videos are the latest malware attack vector
Infostealer installed by users themselves
Millions of login credentials leaked via unsecured database
A cybersecurity researcher has discovered an unsecured Elasticsearch database containing millions of login cr...