
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Hack targets Air Europa: customers must block credit cards
Air Europa has been hit by a hacking attack in which customer credit card data has been stolen. The Spanish a...

Microsoft Defender for Endpoint now automatically isolates infected accounts
Microsoft Defender for Endpoint now automatically takes action on suspicious activity. For example, it automa...

MGM hack: ransom wasn’t paid, company found out about hack in time
MGM Resorts International knew about a hack even before the cybercriminals in question demanded a ransom for ...

Belgian government releases Chrome extension to combat phishing
Belgian security regulator CCB has introduced Safeonweb, a Chrome extension that helps users detect rogue web...

Tidelift shields organizations from the risks of open source
Tidelift has added new capabilities to its Tidelift Subscription. The newly expanded package allows organizat...

SentinelOne CEO debunks rumours of possible sale
SentinelOne has no plans to sell itself and will never have any plans to do so. That clarifies the company's ...

Microsoft closes vulnerabilities in WordPad and Skype for Business
With the new Patch Tuesday, Microsoft is addressing 103 vulnerabilities in its products. Of the 103 vulner...

Cloudflare, Google, Microsoft and Amazon report heaviest DDoS attacks ever
Cloudflare, Google, Microsoft and Amazon all suffered DDoS Layer 7 attacks in the past month. The attacks wer...

Google makes passkeys the default login method
Google made the use of passkeys the default login method for all users. This should provide users with the st...

Arctic Wolf makes SOAR more accessible with acquisition of Revelstoke
Arctic Wolf has acquired SOAR specialist Revelstoke Security. Revelstoke's offerings will soon be integrated ...