
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Schneider Electric and Vericlave work together in the field of security
Schneider Electric has entered into a global partnership with Vericlave, a provider of cybersecurity technolog...

“Half of the industrial networks have been affected by cyber attacks.
Half of the industrial control systems have been affected by a cyber attack. These are factories, energy compa...

Microsoft discovered unsafe Huawei driver via Windows Defender ATP
Huaweis MateBooks, with its own PCManager software active, ran a potential security risk due to an unsafe driv...

Mozilla brings free password manager Firefox Lockbox to Android
Mozilla has made its free password manager for Firefox browser users available on Android. Firefox Lockbox pro...

Hackers hijack ASUS software updates to install back doors
Hackers have taken over a server from computer manufacturer ASUS to install a back on the company's computers ...

Public cloud environments provide too little information for IT security professionals.
New research shows that companies have little insight into their public cloud environments. The tools and data...

Serious vulnerabilities in two WordPress plugins abused
Attackers have exploited serious vulnerabilities in two commonly used WordPress plug-ins in the wild. These ar...

Researchers find 36 new vulnerabilities in the LTE protocol
A group of academics from South Korea has discovered 36 new vulnerabilities in the Long-Term Evolution (LTE) s...

GitLab now automatically alerts you to the merging of API keys in codebase
GitLab has announced that it will add confidentiality detection to version 11.9 of the service. This means tha...
Microsoft brings security program Defender ATP to macOS
Microsoft has made its Windows Defender Advanced Threat Protection (ATP) available for macOS systems. The secu...