Category: TECHNOLOGY

On Valentine’s Day, you can port to Vodafone and get a 50% discount on subscriptions & super prices on phones

On Valentine’s Day, you can port to Vodafone and get a 50% discount on subscriptions & super prices on phones

On Valentine’s Day, Vodafone reconfirms its promise to offer Romanians state-of-the-art technology, easy to buy, easy to pay for and easy to use through EasyTech. Customers who port to the Vodafone network have a 50% discount on RED 15 or RED Infinity 23 subscriptions during the entire contractual period and great prices on Samsung, Apple, Xiaomi, or Huawei smartphones to […]

Read more ›
More Docker compliance tests in Greenbones Vulnerability Management

More Docker compliance tests in Greenbones Vulnerability Management

For almost two years, Greenbone has been adding more and more tests from the recommendations of the Center for Internet Security (CIS) in its security feed. Among the newest ones are benchmarks for the container management solution Docker. Docker is one of the most common container technologies in enterprise environments. Its increasing popularity within DevOps circles, ease-of-use and flexibility made […]

Read more ›
Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), and in September, the IT Security Incident Response Center (CERT-INT) within the Ministry of Internal Affairs announced the identification […]

Read more ›
Eliminating Security Complexity is Key to Reducing Enterprise Risk

Eliminating Security Complexity is Key to Reducing Enterprise Risk

Symantec Enterprise Cloud: a single security solution for the most demanding organizations We always move towards simplification, but the world has a way of moving back.  While allowing employees to work anywhere simplified things for them, it increased the security risk.  Moving to the cloud brings many benefits, it also brings management and compliance complexity. And going all in on […]

Read more ›
ENISA study: Public sector most at risk

ENISA study: Public sector most at risk

In the 10th edition of its ENISA Threat Landscape (ETL), the EU’s cybersecurity agency explicitly warns of increasing threats from hacking attacks on public sector entities. Around a quarter of all security related incidents target administrative or government entities, the ENISA study reports – making the public sector nearly twice as much at risk as hosters and providers, who come […]

Read more ›
Adapting To Evolving Workforces with Network Automation

Adapting To Evolving Workforces with Network Automation

If 2020 and the COVID-19 pandemic taught businesses anything, it’s that remotely managing employees is a necessary workstyle change. Certain companies adapted more swiftly than others; agile businesses that had adopted network automation pivoted the fastest and with the least disruption. There’s no denying that workforces are evolving at unprecedented rates thanks to the need to support remote employees; what’s […]

Read more ›
How does roaming with Vodafone work?

How does roaming with Vodafone work?

For our Pay monthly customers we’ve split the world into Zones A, B, C and D. For our Pay as you go customers, we’ve split the world into Zones A, B and ‘Around the World’. We also have our ‘Rest of the World’ destinations, which are for both our Pay monthly and Pay as you go customers. Roaming in Zone […]

Read more ›
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Symantec, by Broadcom Software, was able to link this activity to a group we track as Billbug due to the use in this campaign of tools previously attributed to this group. Billbug (aka Lotus Blossom, Thrip) is a long-established advanced persistent threat (APT) group that is believed to have been active since at least 2009. Symantec has previously published on […]

Read more ›
The risks of IT and OT convergence

The risks of IT and OT convergence

The worlds of Information Technology (IT) and Operation Technology (OT) have been separate for many years. IT networks are used exclusively for the interconnection of computers, data centers and public networks, while OT networks typically interconnect industrial production machinery. By Giovanni Prinetti This “air-gapped” separation has largely kept OT networks isolated and away from the problems caused by the cyberattacks […]

Read more ›
Next-Generation Dell PowerEdge Servers Deliver Advanced Performance and Energy Efficient Design

Next-Generation Dell PowerEdge Servers Deliver Advanced Performance and Energy Efficient Design

Dell Technologies (NYSE:DELL) expands the industry’s top selling server portfolio1, with an additional 13 next-generation Dell PowerEdge servers, designed to accelerate performance and reliability for powerful computing across core data centers, large-scale public clouds and edge locations. Next-generation rack, tower and multi-node PowerEdge servers, with 4th Gen Intel Xeon Scalable processors, include Dell software and engineering advancements, such as a […]

Read more ›
Network Monitoring: Expertise is the key to success

Network Monitoring: Expertise is the key to success

It used to be that computer networks existed solely for connecting computers to allow the programs they were running to communicate. Thankfully, those days are long gone. by MARK BRULE Today, computer networks connect many devices, sensors, surveillance equipment, printers, and more. The world has become populated with IoT devices that can sense and interact with the world in manifold […]

Read more ›
5 Steps to Better Protect Your Data

5 Steps to Better Protect Your Data

How to Build an Effective Data Security Strategy Five steps towards full visibility and control across your organization It’s no longer business as usual for cybersecurity Dramatically accelerated by the pandemic, your move to the cloud has fundamentally altered your organization’s relationship with users, apps, and data and how they interact with each other. In terms of productivity, this has […]

Read more ›