With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.
All about Virtualization and Cloud Security | Recent Articles:
Predictions are never easy, and they are seldom right or very useful: but they are always fun. And as the holiday season is upon us and the New Year approaches so does the time of year reflection and, you guessed it: cybersecurity predictions.
There’s no doubt that enterprise environments are growing more complex by the day. Just consider the fluid nature of cloud computing and virtualization, the increase in the number of workloads, applications, and types of applications, coupled with the fact that they are distributed among on-premises and various types of cloud, and the explosion of mobile and accelerated adoption of IoT in recent years.
Most every business that is embracing DevOps methodologies is also deploying containers – or thinking about deploying containers. Currently, according to this story in Betanews, there are more than 100 products that currently use containers in agile development and they represent $1.7 billion in venture funding. “Eighty-eight percent of enterprises say they're shifting to a DevOps strategy, and containers are changing the nature of DevOps and transforming infrastructure,” Betanews reports.
A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities has been found by security researchers, potentially used to carry code injection attacks that would go completely unnoticed by traditional security software.
Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.
With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.
As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.
Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to Gartner’s recent forecast.
Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.
Since almost two-thirds of managers surveyed by Gartner say IT risk management data influences decisions at the board level, boards started to admit the importance of their direct involvement once a breach is found and business results are at risk. However, since decisions on the incident response plan have to be fast, board members need to see the big picture and ask the proper questions.
Open source supply chain automation vendor Sonatype released its State of the Software Supply Chain Report this week. Sonatype assembled a significant amount of data on the use of open source software in development environments from 3,000 organizations across 25,000 applications.