
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Wiz buys industry colleague Raftt for improved DevOps security
Israeli security specialist Wiz recently acquired Raftt. With this, Wiz aims to further expand its portfolio ...

Cyber Resilience Act: manufacturers responsible for open-source code
New obligations must protect laptops, mobile applications and smart devices from online threats. A revision o...

Google fixes Android bug that hackers can abuse without privileges
In its recent security update for Android, Google patched a critical vulnerability that enables so-called zer...

Phishing attack disguised as warning from the WordPress security team
A new phishing campaign that aims to install a rogue extension specifically targets administrators of WordPre...

ESA upgrades its security as space becomes susceptible to cybercrime
The European Space Agency (ESA) is also facing cyber threats, as the technology it uses has become increasing...

How cloud solutions integrate with Cato Networks to accelerate performance and security
Dutch enterprises have widely adopted cloud solutions: infrastructure, platforms and SaaS applications as par...

VMware Cloud Director was vulnerable for two weeks without a patch
VMware Cloud Director Appliance version 10.5 has been vulnerable to attacks for two weeks because of a critic...

Apple releases iOS updates for two exploited zero-day vulnerabilities
Apple recently released fixes for two zero-day vulnerabilities that may already be exploited by hackers. The ...

Veeam calls attention to backup and recovery data in new zero-trust model
Veeam is introducing its Zero Trust Data Resilience (ZTDR) model in partnership with Numberline Security. Thi...

Trend Vision One to reduce security risks for hybrid IT environments
Trend Micro has further expanded the functionality of its Trend Vision One security platform with enhanced se...