
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

40 countries will no longer pay for ransomware attack
Companies should no longer pay ransomware gangs to secure their sensitive data. This is the opinion of 40 cou...

SEC accuses SolarWinds of fraud by concealing poor security
The US financial regulator, SEC, has charged software specialist SolarWinds and its CISO with fraud against s...

Google implements new security and AI features in Chrome browser
The Google Chrome browser is getting new security and AI features. More risky requests based on the HTTP prot...

How the MOVEit vulnerability has been making victims since May 2023
CCleaner confirms that hackers have captured customers' personal data. The theft occurred in May when the vul...

Octo Tempest: Microsoft warns of aggressive hacker gang
Microsoft recently published details about the hyper-aggressive Octo Tempest hackers. This hacker gang carrie...

Cloudflare signals DDoS record: 201 million requests per second
According to figures from Cloudflare, a new DDoS record has been set, with a whopping 201 million requests pe...

Google launches Android Credential Manager on November 1st
Google is introducing its Credential Manager functionality for Android on November 1st to provide a streamlin...

Okta hack shows how vulnerable digital authentication is
In recent days, it has become clear how a hack on Okta has major implications for it's customers. The stolen ...

Apple processors vulnerable to sensitive data leaks
The A- and M-Series of processors for Apple's mobile devices and PCs contain a vulnerability that allows hack...

Secior and Forescout enter strategic partnership for holistic security approach
Partnership to link Forescout's solutions with Secior's services. Secior and Forescout let us know that th...