Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
VanHelsing ransomware source code leaked on hacker forum
The ransomware-as-a-service operation VanHelsing has made public the source code of its affiliate panel, data...
M&S hack to cost retailer over 300 million pounds
Update May 21, 2025: Marks & Spencer has indicated that the fallout from the hack will cost some 300 mill...
Active exploitation of vulnerabilities in Ivanti EPMM
Two recent vulnerabilities in Ivanti Endpoint Manager Mobile are being actively exploited by attackers. Resea...
How to balance cybersecurity and innovation at an acceptable risk?
The security landscape is transforming rapidly as AI becomes embedded throughout enterprise technology stacks...
AI overtakes ransomware as the biggest security concern for organizations
By 2025, ransomware will no longer be the undisputed biggest security concern for organizations. Striking a b...
Windows 10 emergency update resolves BitLocker startup issues
As previously announced, Microsoft released an interim emergency update for Windows 10. This is to resolve is...
Fake password manager leads to VMware ESXi hack
Cybercriminals have been spreading manipulated versions of the KeePass password manager for at least eight mo...
Analysis: Dutch TU/e hack caused by known vulnerabilities and human error
The cyberattack on Eindhoven University of Technology (TU/e) in January shows the organization's vulnerabilit...
Rise of AI transforms CISO’s role: from technical to strategic input
Sam Curry, CISO at Zscaler talks strategy and (future) challenges
Hack on Coinbase exposes vulnerability of crypto industry
Cryptocurrency platform Coinbase has announced that it has been the victim of a hack. Although the financial ...