Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Many businesses continue to leave their doors wide open to unsophisticated attackers, research shows

Nov 22 by Filip Truta

New research reveals that cyber-attacks by unsophisticated hackers this year have successfully exploited vulnerabilities that many of the world's famed businesses were already aware of but did nothing to fix.

Read More

Machine learning to fix problem of 3.5 million unfilled cybersecurity jobs by 2021

Nov 22 by Luana Pascu

Demand for cybersecurity experts will increase and become a priority for enterprises, leading to an estimated need for over 1 million cybersecurity professionals in India by 2020 and over 500,000 in the US. The US currently employs 780,000 specialists in cybersecurity, while 350,000 posts are still unfilled, reports CyberSeek, project supported by the U.S. Department of Commerce.

Read More

Cyber Attacks - A Matter of 'When', Not 'If', and How Much They Will Cost You

Ransomware, malware, and other elusive attacks threaten companies of all sizes every year, and the attacks are becoming more aggressive and more frequent.

Every company's executive team should be aware of how to prevent these attacks from happening by making security be a "whole company" initiative instead of just an "IT problem".

Read More

How Is Machine Learning Used in Bitdefender Technologies?

Nov 20 by Luana Pascu

 The terms “artificial intelligence” and “machine learning” are often used interchangeably, but there’s a huge technical difference between them. While the first is used by Hollywood when depicting self-aware machines, the latter is comprised of finely tuned single-task algorithms that are nowhere near self-aware.

Read More

Report Says 1.9 Billion Data Records Were Compromised During First-Half 2017 Breaches

Nov 17 by Bogdan Botezatu

What were the biggest cyber security culprits in the first half of 2017 from a data breach standpoint? Identity theft and poor internal security practices, according to the latest Breach Level Index (BLI) Report by Gemalto.

Read More

Digital Transformation Brings Business Benefits—as Well as Security Threats

Nov 16 by Razvan Muresan

First, here’s the good news: Organizations today are in the midst of digital transformations and an acceleration of their online presence that is enriching their products, deepening customer relationships, and boosting the companies’ brands.

Read More

Five keys to consider when it comes to securing containers

Nov 14 by George V. Hulme

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.

Read More

Amazon moves to stop S3 buckets leaking business data

Nov 12 by Graham Cluley

A long line of very public data breaches have made clear that businesses don’t need to be targeted by sophisticated hackers to have private and sensitive data splashed across the newspaper headlines.

Read More

EDR for Everyone

Nov 09 by Harish Agastya

“EDR is the worst form of endpoint security except all the other endpoint security approaches that have come before it.”

Read More

Bitdefender Provides Cross-Platform Visibility and Security to Windows Defender ATP users

Targetted attacks and advanced persistent threats have become the new normal in enterprises the world over. As high profile attacks multiply, the need for comprehensive threat intelligence across the organization becomes mandatory.

Read More

Survey finds hybrid cloud security growing pains

Nov 07 by George V. Hulme

There’s no doubt that enterprises are embracing cloud computing, but not-so-surprising that enterprises repeatedly say that they need heightened visibility and security management capabilities so they can more effectively deploy applications, defend against cyberattacks, and mitigate regulatory compliance risks, a recent survey found.

Read More

FDA Seeks Secure Medical Device Development Lifecycle

Nov 06 by George V. Hulme

Business Insights readers are certainly well aware of the sorry state of connected medical device security. We’ve covered it in posts such as St. Jude Takes Steps to Secure Vulnerable Medical Implants and U.S. DHS and FDA Face Medical Device Security Woes. In the later post we covered how the FDA is working to foster a culture of continuous quality improvement.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets