
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

More than half a million PCs affected by malware hosted on Bitbucket
Bitbucket, the git-code hosting service, has been abused by hackers. As a result, some 500,000 computers worl...

Ekans-ransomware targets industrial control systems
Cybercriminals have launched ransomware attacks specifically targeting Industrial Control Systems (ICS). Acco...

Tanium cybersecurity goes beyond Unified Endpoint Management
Within the cybersecurity market, most experts agree that it is time for a new way of working. The number of t...

‘Shadow IoT major threat to corporate networks’
Infoblox publishes a new study this week that points to a significant threat to corporate networks by the Sha...

Hackers use smart-control of buildings for DDoS attacks
A vulnerability that allows even 'inexperienced hackers with little expertise' to access the smart-control of...

Microsoft rolls out Intel update for Windows 10 PCs
Vulnerabilities in a range of Intel CPUs need to be fixed as soon as possible: Microsoft comes to the aid of ...

Google introduces open-source two-factor authentication platform
Google has placed a new open source project on GitHub called OpenSK. It is a multifactor authentication platf...

Google pays a record amount for vulnerabilities
The Google Bounty program provides financial compensation to finders of vulnerabilities. The program had a re...

Over two thousand WordPress sites hacked through vulnerable plugins
Vulnerabilities in several WordPress plugins (including Simple Fields) allow hackers to inject JavaScript cod...

Founder of DDoS security company confesses DDoS attacks
The founder of a company specialising in counteracting and protecting against DDoS attacks has admitted in th...