Stormshield

  • Stormshield and EVERTRUST solutions interoperability assured for Google Workspace
    by Karine Monmarché on May 14, 2024 at 11:00 am

    Stormshield and EVERTRUST are thrilled to announce the integration of their solutions Stormshield Data Security for Google Workspace and EVERTRUST Horizon to seamlessly enable email encryption within Gmail. This marks a significant milestone as it introduces a fully automated SaaS encryption solution beyond Google’s ecosystem,… The post Stormshield and EVERTRUST solutions interoperability assured for Google Workspace appeared first on Stormshield.

  • Overview of cyberattacks on connected cities
    by Victor Poitevin on May 13, 2024 at 6:00 am

    The digital transformation of city infrastructures is a response to growing urban densification, and also to energy efficiency and sobriety requirements. However, the transition to increasingly connected cities raises questions about cybersecurity; for after all, anything that is connected is potentially vulnerable. Furthermore, cybercriminals have… The post Overview of cyberattacks on connected cities appeared first on Stormshield.

  • JetBrains TeamCity Security Alert : Stormshield’s product response
    by Stormshield Customer Security Lab on April 24, 2024 at 9:11 am

    JetBrains’ TeamCity CI/CD tool has been hit by four vulnerabilities that allow authentication bypass. These include two critical vulnerabilities, alongside a high one and a medium one. Identified by CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 and CVE-2024-24942, they have been affected a CVS v3.1 score of 9.8, 9.8,… The post JetBrains TeamCity Security Alert : Stormshield’s product response appeared first on Stormshield.

  • A short history of Open Source
    by Fabien Thomas on April 15, 2024 at 7:00 am

    Free software now plays a critical role across the entire computing world… and thus across the world in general. The issue of how such software is maintained has gradually become a matter of concern, prompting the US Congress to introduce a bill in 2023: the… The post A short history of Open Source appeared first on Stormshield.

  • Security Alert D-Link CVE-2024-3272 & CVE-2024-3273: Stormshield’s product response
    by Stormshield Customer Security Lab on April 10, 2024 at 2:53 pm

    Two critical vulnerabilities impacting NAS devices from D-Link, identified by the references CVE-2024-3272 & CVE-2024-3273, have been detected after numerous exploitations attempts. They have been assigned a respective CVSS 3.1 score of 9.8 and 7.3. The Stormshield Customer Security Lab details our protection offerings. It… The post Security Alert D-Link CVE-2024-3272 & CVE-2024-3273: Stormshield’s product response appeared first on Stormshield.

  • Technical analysis of ransomware Crypt888
    by Stormshield Customer Security Lab on April 9, 2024 at 2:50 pm

    The post Technical analysis of ransomware Crypt888 appeared first on Stormshield.

  • Cloud sovereignty needs to be more than just a marketing slogan
    by Eric Hohbauer on April 8, 2024 at 2:53 pm

    In the field of cloud computing, the subject of data sovereignty has evolved from merely a concept in the beginning to become a convincing sales argument… and indeed a crucial differentiating factor in how cloud service providers market themselves. This rise to prominence speaks clearly… The post Cloud sovereignty needs to be more than just a marketing slogan appeared first on Stormshield.

  • Qualification and certification for cybersecurity products: what are the differences?
    by Julien Paffumi on April 2, 2024 at 8:00 am

    The use of certified or qualified solutions is both a demonstration of trustworthiness and an assurance of a proven level of security for the strategic information of the most sensitive companies and organisations. But the difference between certification and qualification is not always apparent. So… The post Qualification and certification for cybersecurity products: what are the differences? appeared first on Stormshield.

  • Stormshield awarded Standard Qualification for its Stormshield Network Security offering
    by Simon Dansette on March 25, 2024 at 7:15 am

    The post Stormshield awarded Standard Qualification for its Stormshield Network Security offering appeared first on Stormshield.

  • XDR: a vitally important shield for all companies
    by Stéphane Prevost on March 18, 2024 at 7:00 am

    In a constantly evolving digital landscape, with an increasing number of entry points into computer systems, no organisation is immune to modern threats. Cyberattacks are becoming increasingly sophisticated, sparing neither large enterprises nor SMEs. This is where the implementation of an XDR (eXtended Detection and… The post XDR: a vitally important shield for all companies appeared first on Stormshield.

Websitecyber related posts:

LCBO 3rd Party Data Breach

The Liquor Control Board of Ontario (LCBO) says the personal data of some customers has been compromised in a data breach for the second time this year.

23andMe Data Breach

The popular genetic testing company 23andMe had suffered a data breach. According to the company, the breach impacted nearly 7 million users.

Microsoft Azure Blog Security

The latest information and news from the Microsoft Azure Blog Security.

Group Behind Cyberattack Paid $22M

It has been reported that the group responsible for the recent cyberattack on change health has received a staggering $22 million in the last 48 hours.

Cyber Attack Group Down By FBI

A criminal ransomware network connected to a cyber attack at some of Connecticut’s hospitals has been taken down by the FBI.

TrustArc Privacy Security

TrustArc powers privacy security compliance and risk management with integrated technology, consulting and privacy certification solutions.

The Future of Cyberwarfare

Cyberwarfare in the 21st century will be waged on many fronts one of which will be a digital battlefield with no guns or bombs.

Industry News – Help Net Security

Industry news Archives Help Net Security Daily information security news with a focus on enterprise security.

Why The U.S. Can't Stop Cyber Attacks

The U.S.A. recently faced a series of ransomware attacks and cyber attacks on critical infrastructure like the Colonial Pipeline, the city of Tulsa, and JBS, th...

China’s Hacking Industry Unveiled

Andrew, a vocal critic of the Chinese Communist Party, has shed light on the dangerous tactics used by the CCP hacking industry to silence dissenting voices.

Dozens Targeted by Phishing Scams

Phishing scams have become a common with scammers finding new ways to trick unsuspecting victims into giving away their personal and financial information.

Europe Under Cyber-Attack

Europe is under cyber-attack with a dramatic increase being seen, particularly since the start of the war in Ukraine.
Share Websitecyber