
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Secior and Forescout enter strategic partnership for holistic security approach
Partnership to link Forescout's solutions with Secior's services. Secior and Forescout let us know that th...

Darktrace/Cloud provides visibility and security for the cloud
The new Darktrace/Cloud solution provides security teams better visibility into cloud architectures. This is ...

Hotel industry faces large-scale phishing attack
The hotel industry has been facing a major global advanced phishing attack since June. This is a two-step att...

1Password suffers from Okta hack
1Password has spotted suspicious behavior in its internal Okta account. The incident is related to the recent...

September 2023 is a record ransomware month
The month of September delivered a record number of ransomware attacks. This is the finding of security ex...

Google makes Gmail and Chrome more secure
Google has implemented new security features for Gmail and Chrome. In addition to measures for bulk e-mail an...

Patches for Citrix NetScaler are insufficient, more action needed
The vulnerabilities in Citrix NetScaler Gateway and NetScaler ADC cannot be fully resolved with the patches t...

Police forces take down RagnarLocker leak sites
An international coalition of police forces has taken the leak sites of the ransomware gang RagnarLocker offl...

HR topics used the most as attack method in phishing attacks
HR-related topics are the most commonly used among hackers to enable phishing attacks. The tactic is far from...

New vulnerabilities found in NetScaler Gateway and ADC
Citrix has disclosed highly critical vulnerabilities in NetScaler Gateway and NetScaler ADC. The Dutch Minist...