
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Windows security updates lead to VPN problems
Microsoft indicates that March security updates for Windows 11, 10 and various Windows Server versions are br...

Don’t wait for NIS2 legislation, organizations can do a lot now
NIS2 is and will be everywhere in 2024. It is undoubtedly on the radar of all companies that are somewhat con...

20% of Docker Hub repositories spread malware
Docker Hub repositories have been massively used to spread malware and phishing websites since 2021. Docke...

Flaw in R programming language poses major security threat
Without a patch, the R programming language contains a serious vulnerability. An error in data deserializatio...

Verizon: half of breaches have internal cause
According to Verizon research, 49 per cent of all breaches in the EMEA region, including Europe, are committe...

Dell introduces series of new services to combat cybersecurity threats
Dell is expanding its data storage and security portfolio with applications designed to help organizations be...

Amount paid in ransomware attacks five times bigger than last year
The average amount paid in ransomware attacks increased 500 percent over the past year. Organizations that p...

Akamai combines ZTNA and microsegmentation in Guardicore Platform
The new platform should help security teams fight ransomware, meet compliance standards, and secure hybrid cl...

What is ‘credential stuffing’ and how do you defend against it?
Okta and Cisco recently warned of an unprecedented spike in "credential stuffing" attacks. What does that ent...

Muddling Meerkat manipulates China’s Great Firewall
Security researchers warn of the particularly dangerous Muddling Meerkat, which bypasses traditional security...