Subscribe to Email Updates

All about Virtualization and Cloud Security | Recent Articles:

What Organizations Should Know When Implementing IoT Projects

Apr 28 by Liviu Arsene

With more than 24 billion Internet of Things (IoT) devices estimated to hit the market by 2020 and spending on IoT solutions over the next five years to reach nearly $6 trillion, organizations cannot afford not to start preparing for adoption.

Read More

Cybersecurity Insurance: Closing the Widening Risk Gap

Apr 26 by George V. Hulme

It seems no matter how hard enterprises try, no matter what investments in security controls and processes they make, and no matter how much they strive to harden their systems, data breaches, data manipulation, cyber extortion and other attacks on availability are going to happen. Just like taking precautions to protect themselves from fraud and theft, or natural disasters like hurricanes, tornados, earthquakes and fires. Industry takes steps to mitigate these risks, but can’t eliminate these risks. Cybersecurity is much the same.

Read More

Cloud and SDN Convergence Demand Shift in Network Security

Apr 25 by Ericka Chickowski

Life in the SOC has grown a lot more complicated in the last few years as the major forces of cloud and software-defined networking (SDN) adoption have started to converge on enterprise IT in a very big way.

Read More

Petya and the Cost of Ransomware Recovery for Businesses

Apr 20 by Liviu Arsene

With cybercriminals making millions – if not billions – of dollars from ransom requests, companies have also been targets of opportunity. While file encrypting ransomware such as CryptoWall have been known to cause financial losses topping $18 million, variants that encrypt the NTFS MFT (Master File Table) – Petya for instance – have been raising concern, as recovery from it involves complete endpoint downtime and significant IT challenges.

Read More

Has Your Website Been Deleted? It May Not Be Hackers at Work… but a Blundering Web Host

Apr 19 by Graham Cluley

It’s one of the more famous quotes about computer programming:

To err is human, but to really foul things up requires a computer.

Read More

How IoT and Security Play Out in a Businesses Environment

Apr 18 by Alexandra Gheorghe

The Internet of Things and quantified-self movements have led to an explosion of interesting gadgets for consumers and households, and we've detailed the types of IoT vulnerabilities and attacks in smart homes in our latest research paper. But the IoT is also laying the foundations of a new way of working. It’s about using information technology to reshape how, and where, we work.

Read More

Are SMBs Facing Organized Cybercrime?

Apr 14 by Liviu Arsene

SMBs growth by far surpasses enterprise growth, last year reaching a compound annual growth rate (CAGR) of 32% when large enterprises explored opportunities to split. Consequently, entrepreneurs have realized that it’s becoming increasingly difficult to build businesses, and that technologies can be easily incorporated.

Read More

How Healthcare Organizations Can Be HIPAA Compliant and Bolster Security in a Virtualized IT Environment

Apr 12 by Shaun Donaldson

Healthcare institutions remain among the most targeted organizations when it comes to hacker attacks and other security intrusions. These entities possess a wealth of data, including personal information that cyber criminals can use.

Read More

Panama Papers Curse: How to Prevent Your Company from Becoming the Next Mossack Fonseca

Apr 11 by Razvan Muresan

The major Panama Papers breach involving millions of files that reveal a complex tax evasion system developed by the richest and most influential people in the world was not a hack, as initial reports said. It was an inside job.

Read More

Major Mistakes That Can Leave Any CIO Jobless

Apr 07 by Razvan Muresan

CIOs are becoming increasingly important as cybercrime inflicts significant operational, reputational and financial damage, and company boards fear losses that might ruin business forecasts.

Read More

Cybersecurity Data: Are We Sharing Enough?

Apr 06 by George V. Hulme

There has been a lot of discussion recently about the need for improved cybersecurity information sharing. The catalyst is that the more information about cyber attack trends, vulnerabilities, and attack techniques organizations can share than the nimbler and directed and hopefully effective IT security defenses could be.

Read More

Security Skills Stay in Hot Demand

Apr 05 by George V. Hulme

The cybersecurity jobs market is white hot and is showing no signs of letting up. How hot is the cybersecurity jobs market? Most recently, enterprise technology publication Computerworld, in its 2016 IT Salary Survey, reported that Information Security Manager and Information Security Specialist are both among the top five in-demand jobs in IT.

Read More