Subscribe to Email Updates

All about Virtualization and Cloud Security | Recent Articles:

Half of companies unnecessarily grant employees more access than needed

Aug 26 by Razvan Muresan

Although insider leaks and attacks continue to multiply, recent research found 58 percent of IT operations and security managers believe their organizations unnecessarily grant access to individuals beyond their roles, with 91 percent predicting the risk of insider threats will grow or stay the same.

Read More

Cloud use increases attack surface up to 100-fold; companies fail to keep up with flood of threats

Aug 24 by Razvan Muresan

Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.

Read More

Practical steps for strengthening your company's password rules

Aug 23 by Graham Cluley

Passwords are a perennial problem.

We rely so much on them to secure our company systems, our secrets, our customers’ private information… and yet we typically leave it in the hands of our users to choose their passwords safely.

Read More

The dark side of the cloud: improper sharing and access, most cloud-related security incidents, study shows

Aug 22 by Razvan Muresan

With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.

Read More

Tor vs. I2P – Anonymization and B2B Opportunity

Aug 18 by Liviu Arsene

The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.

Read More

Healthcare Industry Still in Need of Cyber Security Treatment

Aug 17 by Bogdan Botezatu

Two recent hacker attacks show that the cyber assault against organizations in the healthcare sector continues.

Read More

Calculating the economic impact of security incidents on critical infrastructure remains elusive

Aug 16 by George V. Hulme

With the rise of APTs and the continued interconnection of critical infrastructure business-technology systems and field systems and devices the attention toward critical infrastructure security has never been higher. And nations around the world are building both offensive and (more slowly) defensive capabilities when it comes to cyber-attacks targeting critical infrastructure.

Read More

Getting executive buy-in for identity management

Aug 12 by George V. Hulme

Some enterprise technology deployments can be handled entirely by IT, don’t require executive support or the cooperation of the entire organization. Identity management implementations are not one of these types of initiatives. They take dedicated and adequate budget, executive leadership, and long-term enterprise-wide dedication. So how do enterprises get the C-suite buy-in they need?

Read More

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

Aug 11 by Razvan Muresan

As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.

Read More

International Association of Certified ISAOs launches as global leadership association to support security threat and defense information

Aug 10 by George V. Hulme

There are few things that everyone in the information security industry agrees upon, but the need to share threat and risk mitigation information is certainly one area where there is majority agreement. Everyone concurs that it’s essential for security professionals to share security related intelligence about their industries, about what defenses and controls work, and what controls don’t, and information about the daily changing nature of the threats out there.

Read More

Information Security Spending To Reach the $80-Billion-a-Year Threshold in 2016. IT Outsourcing and DLP, Main Drivers

Aug 09 by Razvan Muresan

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to Gartner’s recent forecast.

Read More

Big Black Hat 2016 Story Round-up

Aug 08 by George V. Hulme

The hacks and vulnerabilities out of Black Hat USA are interesting every year. Last year much of the focus was on flaws within cars, mobile devices, and IoT. There was a lot of focus on those areas this year, too. And I expect much of the attention paid to vulnerabilities to continue to be on the extended Internet and IoT for years to come.

Read More