
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

LogRhythm and Exabeam merger is step towards larger SOC platform
LogRhythm and Exabeam have announced that they are merging, marking another step toward change in the securit...

VAST Data and Superna together keep enterprise AI adoption secure
VAST Data makes it possible to leverage heaps of unstructured data for AI. That data is kept safer than ever ...

Okta merges identity into one platform: what does that entail?
Okta recently hosted customers at the FC Utrecht stadium in the Netherlands. This MeetUp focused on 'The Conv...

Scalable quantum network becomes a reality in Port of Rotterdam
The Quantum Delta NL program is making steady progress. The consortium behind this quantum encryption tech is...

Trust and AI in cybersecurity: difficult but crucial to navigate (Alex Stamos, SentinelOne)
For this new episode of Techzine Talks on Tour we sat down with Alex Stamos during RSA Conference. Stamos is ...

Uncertainty surrounding breach of Zscaler
Cybercriminal IntelBroker claims to have obtained sensitive data from Zscaler and recently put it up for sale...

I tried to say goodbye to my personal passwords
After multiple conversations about passkeys in recent months, I decided it was the right time to join the mov...

Citrix warns admins to manually mitigate bug in SSH client
Admins must manually mitigate a vulnerability in the PuTTY SSH client. Citrix warns that attackers can steal ...

49 million customers affected by Dell hack
Dell Technologies has been hit by a hack. In the process, a database containing the personal data of about 49...

A good security stack deserves a good security culture (Stu Sjouwerman, KnowBe4)
The human is often seen as the weak link in cybersecurity. You can have all the security tooling in the world...