
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

SEC warns of misconfiguration of NAS, database and cloud storage servers
The US Securities and Exchange Commission (SEC) has issued a security alert, alerting companies to the danger ...

Cisco: ‘Densely dangerous error that can lead to remote attacks via advertisements’.
Cisco has plugged a serious security hole in the web-based user interface of its IOS XE software. The error ma...

Adobe solves critical errors in Flash, ColdFusion and Campaign with update
Adobe has made its monthly patch update available. The June update solves a handful of vulnerabilities in Flas...

‘Huawei-ban U.S. has long-term implications for U.S. tech companies.’
S&P rating agency warns against the American ban on Huawei. According to S&P, the ban creates barriers...

‘Every cybersecurity specialist needs forensic knowledge of Windows’
Whichever way you look at it, Microsoft's software solutions - and of course, Windows in particular - are sti...

Safe use of new technology bottleneck for Dutch companies’.
Dutch companies are struggling to use new technology securely and to secure sensitive data. This is evident fr...

“Budgetchef White House wants to slow down the ban on Huawei.
The acting budget chief of the White House wants the ban on Huawei to be postponed. The chief, Russel T. Vough...

LogRhythm provides advanced monitoring of on-premise networks
In two interviews with LogRhythm, we explored how they can add a layer of security to a corporate network, in...

GoldBrute-botnet attacks Windows systems worldwide with RDP connections
Security researchers have discovered a new botnet called GoldBrute. The botnet attacks Windows systems that ha...

Elastic focuses on endpoint security with acquisition of Endgame
Elastic, the company behind Elasticsearch, has signed a deal to acquire endpoint security company Endgame for ...