Armis Security provides insight into IT, OT and IoT vulnerabilities
New security vendor in our region promises insight into the vulnerability of all conceivable assets within the organization and does this in a user-friendly and simple way.
If you really want to tackle security properly, you must first know what you have in terms of assets, and what these assets... Read more
Oracle gives OCI major security boost
New security enhancements should make Oracle Cloud Infrastructure (OCI) even more resistant to attack. It aims to do this without making it more complicated for end users than it already is.
If you have ever attended a keynote or other presentation from Oracle about OCI, you must have noticed th... Read more
“Nutanix will make the cloud invisible”
Nutanix has made data centre infrastructures invisible in recent years with its platform. It can manage all infrastructure from one Nutanix portal. The next step is to make the cloud invisible in the coming years. At least, that's what the CEO of Nutanix, Rajiv Ramaswami, told us in an exclusive in... Read more
‘To stop ransomware, you will need a radically different security approach’
Many IT vendors and companies see ransomware as one of the most dangerous threats. After all, ransomware has been prevalent for years and will probably remain popular for a long time simply because there is a lot of money. However, there should be fewer victims if it is up to Datto-CISO Ryan Weeks.... Read more
How do you interpret the results of MITRE ATT&CK evaluations?
Not all detections are created equal. Keep that in mind when choosing cybersecurity tools.
The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more
Research: new tools and security measures often counterproductive
Research by Zivver reveals that although companies have accelerated their innovation efforts in the past two years, many challenges remain. Employees that participated in the study complain about security measures that are counterproductive and slow down work. Many applications have been added in t... Read more
Twitter accepts offer from Elon Musk, but now what?
The Twitter board has changed its mind. They have accepted the offer of 44 billion dollars. Earlier, it seemed that they would fight the acquisition tooth and nail, but the offer is too good to ignore. Elon Musk will soon have full ownership of Twitter. The big question is, what happens now?
Sho... Read more
OutSystems CEO: “Shift-left is great for us, it fits our environment very well”
OutSystems CEO Paulo Rosado on its unique position in the market, current challenges in development, and how low-code can help solve those.
We recently had a chance to catch-up with Paulo Rosado, one of the founders and CEO of OutSystems. As one of the pioneers when it comes to low-code developm... Read more
Cato Networks makes BrandLoyalty’s WAN fast, transparent and secure
BrandLoyalty wanted to modernize its global WAN, and had some very clear wishes and requirements. After a thorough RFP, they went for Cato Networks. We spoke with Ben de Laat and Arne van Vuuren, respectively the Head of IT Security and Head of IT Operations at BrandLoyalty, about this choice.
B... Read more
Ransomware is an APT, so you should treat it as such
Research from Splunk's SURGe division shows that there are major differences between ransomware variants in how fast they operate. Why is that important for organizations to know? And what does that mean for Splunk's product offering?
We talk about the above and other issues with Johan Bjerke, P... Read more