Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Research exposes large-scale investment fraud via the internet
Cybercriminals are using increasingly sophisticated methods to defraud victims of their money through investm...
Cisco launches Foundation AI and introduces open-source security AI model
Cisco is launching a new initiative today at the RSAC 2025 Conference: Foundation AI. This new team within Ci...
Flashpoint launches AI-driven tools for better threat intelligence
Flashpoint has introduced new AI capabilities for its Ignite platform at the RSAC 2025 Conference. The innova...
Sumo Logic unifies security for faster threat detection
Sumo Logic announced new security features at the RSAC 2025 Conference that help build intelligent security o...
Rapid rise of AI is leading to more cyberattacks
Cybercriminals are taking advantage of the rapid development of AI. A new report from LevelBlue shows how ser...
Cisco and ServiceNow expand partnership to better secure AI
Organizations that want to start using AI want (and need) to do so securely. By deepening their partnership, ...
What the Marks & Spencer cyberattack can teach retailers
Quick and strong response, but a major impact
Microsoft makes hot patching a paid feature for Windows Server 2025
Hotpatching is a new feature for Windows Server 2025. Patching without reboots means that administrators can ...
SAP patches zero-day vulnerability in NetWeaver, denies exploitation
SAP has released emergency patches for a critical zero-day vulnerability in NetWeaver. The security flaw allo...
Hackers exploit OAuth 2.0 workflows to hijack accounts
Russian hackers are exploiting legitimate OAuth 2.0 authentication processes to take over Microsoft 365 accou...