Category: TECHNOLOGY

Vodafone opened the first EasyTech store

Vodafone opened the first EasyTech store

The new retail concept brings more interactivity and five times more products for the customers Vodafone launched the first EasyTech store, thus marking the beginning of a new stage in the transformation process into a technology company, which involves rethinking the experience offered to customers throughout the complete retail chain. The store is located at the ground floor of the […]

Read more ›
Vodafone launches Cartela Banii Înapoi

Vodafone launches Cartela Banii Înapoi

Vodafone is launching today „Cartela Banii Înapoi”, a new prepaid product unique in Romania through which every time the Vodafone Card is recharged with a minimum credit of 6 euros, the user receives back the recharged value in the My Vodafone application. The cashback is doubled if the user recharges from My Vodafone app. The money thus accumulated can be […]

Read more ›
Veeam Releases NEW Veeam Data Platform to Keep Businesses Running as Ransomware Continues to Increase

Veeam Releases NEW Veeam Data Platform to Keep Businesses Running as Ransomware Continues to Increase

Veeam® Software, the leader in Modern Data Protection, today announced the NEW Veeam Data Platform, a single platform delivering more advanced data security, recovery and hybrid cloud capabilities than ever before. The Veeam Data Platform, which includes Veeam Backup & Replication™ (VBR) v12, provides best-in-class secure backup and fast reliable recovery that keeps business running. It brings together the latest […]

Read more ›
On Valentine’s Day, you can port to Vodafone and get a 50% discount on subscriptions & super prices on phones

On Valentine’s Day, you can port to Vodafone and get a 50% discount on subscriptions & super prices on phones

On Valentine’s Day, Vodafone reconfirms its promise to offer Romanians state-of-the-art technology, easy to buy, easy to pay for and easy to use through EasyTech. Customers who port to the Vodafone network have a 50% discount on RED 15 or RED Infinity 23 subscriptions during the entire contractual period and great prices on Samsung, Apple, Xiaomi, or Huawei smartphones to […]

Read more ›
More Docker compliance tests in Greenbones Vulnerability Management

More Docker compliance tests in Greenbones Vulnerability Management

For almost two years, Greenbone has been adding more and more tests from the recommendations of the Center for Internet Security (CIS) in its security feed. Among the newest ones are benchmarks for the container management solution Docker. Docker is one of the most common container technologies in enterprise environments. Its increasing popularity within DevOps circles, ease-of-use and flexibility made […]

Read more ›
Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Safetech CERT, the ideal solution for monitoring, managing and reporting cyber security incidents

Last year, organizations in Romania faced a massive increase in the volume of IT threats, especially at the end of the year. In June, STS reported an intensification of DDoS attacks (also confirmed by the National Cyberint Center within the SRI), and in September, the IT Security Incident Response Center (CERT-INT) within the Ministry of Internal Affairs announced the identification […]

Read more ›
Eliminating Security Complexity is Key to Reducing Enterprise Risk

Eliminating Security Complexity is Key to Reducing Enterprise Risk

Symantec Enterprise Cloud: a single security solution for the most demanding organizations We always move towards simplification, but the world has a way of moving back.  While allowing employees to work anywhere simplified things for them, it increased the security risk.  Moving to the cloud brings many benefits, it also brings management and compliance complexity. And going all in on […]

Read more ›
ENISA study: Public sector most at risk

ENISA study: Public sector most at risk

In the 10th edition of its ENISA Threat Landscape (ETL), the EU’s cybersecurity agency explicitly warns of increasing threats from hacking attacks on public sector entities. Around a quarter of all security related incidents target administrative or government entities, the ENISA study reports – making the public sector nearly twice as much at risk as hosters and providers, who come […]

Read more ›
Adapting To Evolving Workforces with Network Automation

Adapting To Evolving Workforces with Network Automation

If 2020 and the COVID-19 pandemic taught businesses anything, it’s that remotely managing employees is a necessary workstyle change. Certain companies adapted more swiftly than others; agile businesses that had adopted network automation pivoted the fastest and with the least disruption. There’s no denying that workforces are evolving at unprecedented rates thanks to the need to support remote employees; what’s […]

Read more ›
How does roaming with Vodafone work?

How does roaming with Vodafone work?

For our Pay monthly customers we’ve split the world into Zones A, B, C and D. For our Pay as you go customers, we’ve split the world into Zones A, B and ‘Around the World’. We also have our ‘Rest of the World’ destinations, which are for both our Pay monthly and Pay as you go customers. Roaming in Zone […]

Read more ›
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Symantec, by Broadcom Software, was able to link this activity to a group we track as Billbug due to the use in this campaign of tools previously attributed to this group. Billbug (aka Lotus Blossom, Thrip) is a long-established advanced persistent threat (APT) group that is believed to have been active since at least 2009. Symantec has previously published on […]

Read more ›
The risks of IT and OT convergence

The risks of IT and OT convergence

The worlds of Information Technology (IT) and Operation Technology (OT) have been separate for many years. IT networks are used exclusively for the interconnection of computers, data centers and public networks, while OT networks typically interconnect industrial production machinery. By Giovanni Prinetti This “air-gapped” separation has largely kept OT networks isolated and away from the problems caused by the cyberattacks […]

Read more ›