Subscribe to Email Updates

All about Virtualization and Cloud Security | Recent Articles:

Shellshock two years on – has your company forgotten about it?

Oct 03 by Graham Cluley

It’s just over two years since a critical Shellshock vulnerability was uncovered.

Read More

Half of companies unnecessarily grant employees more access than needed

Aug 26 by Razvan Muresan

Although insider leaks and attacks continue to multiply, recent research found 58 percent of IT operations and security managers believe their organizations unnecessarily grant access to individuals beyond their roles, with 91 percent predicting the risk of insider threats will grow or stay the same.

Read More

Practical steps for strengthening your company's password rules

Aug 23 by Graham Cluley

Passwords are a perennial problem.

We rely so much on them to secure our company systems, our secrets, our customers’ private information… and yet we typically leave it in the hands of our users to choose their passwords safely.

Read More

Tor vs. I2P – Anonymization and B2B Opportunity

Aug 18 by Liviu Arsene

The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More

How should businesses respond to the TechCrunch hack?

Jul 27 by Graham Cluley

If it can happen to a website as popular as TechCrunch, it might happen to you too.

Read More

The Ongoing Security Struggles of SMBs

Jul 21 by Bogdan Botezatu

It’s tough enough for large global enterprises to build a strong security program. Small and mid-sized businesses (SMBs) have their own unique set of challenges, the biggest of which might be a lack of financial and professional resources to deploy and maintain the latest technologies.

Read More

Petya and the Cost of Ransomware Recovery for Businesses

Apr 20 by Liviu Arsene

With cybercriminals making millions – if not billions – of dollars from ransom requests, companies have also been targets of opportunity. While file encrypting ransomware such as CryptoWall have been known to cause financial losses topping $18 million, variants that encrypt the NTFS MFT (Master File Table) – Petya for instance – have been raising concern, as recovery from it involves complete endpoint downtime and significant IT challenges.

Read More

Are SMBs Facing Organized Cybercrime?

Apr 14 by Liviu Arsene

SMBs growth by far surpasses enterprise growth, last year reaching a compound annual growth rate (CAGR) of 32% when large enterprises explored opportunities to split. Consequently, entrepreneurs have realized that it’s becoming increasingly difficult to build businesses, and that technologies can be easily incorporated.

Read More

SMBs Undervalue Their Data. So Did Hospitals, Until Now

Mar 30 by Alexandra Gheorghe

The healthcare industry is under fire these days. Hospitals are falling victim to a cyber-epidemic that is paralyzing their systems and asking for huge ransoms in return.

Read More

Cyberattacks, Cybersecurity, and Where’s It All Heading

Mar 28 by Liviu Arsene

Cybersecurity has become a major topic of discussion for businesses and organizations of all sizes, as the number of security incidents has spiked, capturing headlines worldwide. 

Read More

In Demand: Managed Security Services

Mar 23 by Shaun Donaldson

This is a good time to be a managed security services provider—if you believe industry reports about the robust growth of the market. Even if you don’t believe the research, there is plenty of evidence that many organizations are looking for expert help when it comes to strengthening their security posture against a host of potential threats. And service providers can provide that needed assistance.

Read More