
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Fortinet warns vulnerability in FortiClientEMS is exploited in the wild
Fortinet is warning users of the Fortinet FortiClient Enterprise Management Server (EMS) about the active mis...

Personal data exposed at Air Europa
The data leak involved the airline's passengers' identity card and passport information. The company annou...

Dutch researcher discovers Fujitsu blunder: AWS keys and logins in public bucket
Fujitsu failed to keep customers' sensitive information secure. AWS keys and passwords were publicly publishe...

Windows and Exchange Servers crash after March 2024 update
The latest Windows and Exchange Server update is causing domain controllers to crash. The problems occur on W...

Care retailer of Belgian health insurance provider victim of data breach
Goed, a healthcare retailer and part of the CM, fell victim to a cyber attack. Data was stolen during the att...

Almost 19 million passwords exposed due to Firebase misconfigurations
Cybersecurity researchers recently discovered a startling security lapse involving nearly 19 million plaintex...

Cato Networks prepares for IPO in 2025
Cato Networks plans to go public no later than 2025. Plans are said to be currently being prepared in collabo...

Venafi Firefly supports SPIFFE: efficient management of workload identities
Venafi Firefly is getting support for SPIFFE (Secure Production Identity Framework For Everyone). This way, t...

Aviatrix releases Distributed Cloud Firewall for Kubernetes
According to Aviatrix, there's a significant a security gap between virtual machines (VMs) and Kubernetes. Fo...

Sonatype SBOM Manager turns static ‘inventory lists’ into actionable assets
Sonatype, specializing in software supply chain optimization, introduces its own SBOM Manager to address moun...