
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Palo Alto Networks unveils new native 5G security offering
New offering will enable service providers and Enterprises to create new revenue streams while securing 5G. ...

AWS launches AWS Network Firewall to protect VPCs
Move signals Amazon's expansion into the cybersecurity sector. AWS this week expanded its presence in the ...

Microsoft developing successor to Trusted Platform Module
Microsoft is working on a new chip to protect the security keys used by a machine. The so-called Pluton chip ...

Hackers use cloud services to enhance their flexibility and speed
Are underground cloud services a thing Well, they are quite real, and criminals are taking advantage of their...

Danish intelligence agency helped NSA spy on Europe
The National Security Agency, an American intelligence agency, has had access to Danish intelligence networks...
Intel fixed leaks that can be used to install malicious firmware
Last week, Intel rolled out fixes for some vulnerabilities that allowed attackers to install malicious firmwa...

Barracuda acquires Fyde and launches new product
Security company Barracuda has broadened its offer with the acquisition of Fyde. Barracuda will continue to s...

Microsoft issues patches for 112 security flaws
This month's security patch release addresses critical vulnerabilities including a Windows kernel flaw. I...

Researchers find power leakage attacks that threaten Intel CPUs
A multinational team of security researchers have identified a new threat to machines using Intel CPUs. An...

New version of ransomware targets Linux systems
The new iteration of the notorious RansomEXX ransomware targets machines running the Linux operating system. ...