
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

‘Most Microsoft 365 customers saw attempts for account takeovers’
Intrusion attempts on Microsoft 365 accounts appear to be very widespread. The vast majority of companies tha...

AI puts emphasis back on prevention of cyber attacks
Prevention is better than cure, or so the well-known adage goes. At cybersecurity events over the past decade...

15 vulnerabilities in Netgear ProSafe JGS516PE switch
Netgear has released security and firmware updates to address 15 vulnerabilities in its ProSAFE brand JGS516P...

Datto purchases BitDam to offer cyber threat protection for the SMB
BitDam, an Israeli developer of cyber threats detection tools was acquired on Wednesday by Datto, an MSP-focu...

German government agencies compromised by Exchange vulnerabilities
The state security authorities say 4 in 6 breaches represented a "possible compromise". The recent wave of...

Google engineer: Devs must adopt new methods in a post-Spectre world
An engineer at Google is asking developers to be more security conscious in a world filled with malware like ...

McAfee exiting the enterprise security market
Cybersecurity company McAfee has announced that it is divesting its business branch. The company wants to foc...

Security company KnowBe4 acquires MediaPRO
KnowBe4 has announced that it has reached an agreement to acquire MediaPRO. The intention is to combine the p...

Study finds Intel CPU interconnects open to exploitation by malware
According to academic researchers the exploits of Intel CPU's can leak encryption keys and other vital inform...

Okta signs agreement to acquire Auth0 for 6.5 billion dollars
The deal makes Okto more complete in providing Identity to the Internet. To persons and machines. Okta ann...