Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Report on AI-driven ransomware gave misleading picture
MIT Sloan School of Management recently retracted a study that claimed that the majority of ransomware attack...
Zscaler protects the entire AI lifecycle after acquiring SPLX
Zscaler has acquired SPLX, an AI security company. The acquisition strengthens the Zero Trust Exchange with t...
KnowBe4: how workforce trust weans organizations off mistrust
Traditional security awareness training programs have perennially suffered from proof problem. When are your ...
One in four organizations unprepared for cyber threats
Kaseya's 2026 Cybersecurity Outlook Report shows that organizations worldwide are poorly prepared for cyberat...
AI Integrity: The Invisible Threat Organizations Can’t Ignore
AI systems are increasingly making decisions that impact people, processes, and businesses. But what if the m...
Why your SOC needs a ROC
Qualys CEO Sumedh Thakar dives into vulnerability, risk and the ROC
EU diplomats targeted by Chinese attackers via Windows exploit
The Chinese cyber threat UNC6384 was already known to target diplomats in Southeast Asia. Now it appears that...
Docker fixes serious vulnerabilities in Compose and Desktop Installer
Docker has fixed two serious vulnerabilities in its software. A bug in Docker Compose allowed writing files o...
OpenAI Aardvark automatically detects vulnerabilities
OpenAI introduces Aardvark, an autonomous security agent that detects and resolves code vulnerabilities. The ...
Phishing via LinkedIn is on the rise with sophisticated tactics
Attackers are increasingly shifting from email to LinkedIn to spread phishing attempts. Security company Push...