
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Microsoft introduces passkeys for consumer login
Microsoft is now offering consumers the ability to log into Microsoft services with passkeys. With this, the ...

Dirty Stream abuses sharing feature Android apps
Microsoft has discovered a new attack method that abuses the Android data-sharing feature between apps. This ...

After security debacles, Microsoft adds new executives
Microsoft is adding the role of Deputy CISO. With this, the company wants to improve its communications with ...

Executives often lack insight into cyber threats
Communication between security teams and corporate executives structurally leaves much to be desired. This le...

Cybercriminals steal personal data from Dropbox Sign service
Dropbox Sign, Dropbox's digital signature service, has been hacked. According to the online storage specialis...

Digidentity founder: “European digital wallet is preferred tool against data fraud”
Marcel Wendt, founder of Digidentity, wants to know how far the possibilities go of the digital identity wall...

Windows security updates lead to VPN problems
Microsoft indicates that March security updates for Windows 11, 10 and various Windows Server versions are br...

Don’t wait for NIS2 legislation, organizations can do a lot now
NIS2 is and will be everywhere in 2024. It is undoubtedly on the radar of all companies that are somewhat con...

20% of Docker Hub repositories spread malware
Docker Hub repositories have been massively used to spread malware and phishing websites since 2021. Docke...

Flaw in R programming language poses major security threat
Without a patch, the R programming language contains a serious vulnerability. An error in data deserializatio...