Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

US Commerce on Security and Market Incentives — Consumers don’t want security

Jan 22 by George V. Hulme

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.

Read More

Any organization could be the target of a data breach in 2018, digital identity experts say

Jan 17 by Filip Truta

Fraudsters have moved from making a fast buck to crafting more ambitious, targeted attacks that produce long-term profits, according to an extensive analysis of real-world cybercrime attacks.

Read More

Data protection is a prime concern for Italian IT execs that embrace data center modernization

Jan 17 by Razvan Muresan

Italian IT decision makers perceive security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a prime concern.

Read More

Human error identified as the #1 reason behind most cyberattacks

Jan 16 by Filip Truta

A survey of 612 Chief Information Security Officers suggests CISOs have a tough road ahead in an ongoing climate of high-profile data breaches.

Read More

A Key Questions as U.S. Federal Government Agencies Move Further Into the Cloud: How to Manage and Secure Their New Hybrid Environments

Jan 15 by Razvan Muresan

U.S. federal government agencies today are among the biggest users of cloud services. This is a result of years of effort to shift data and workloads to the cloud in order to reduce spending and increase efficiency.

Read More

Six in 10 US employees clueless about GDPR – survey

Jan 11 by Filip Truta

Just months before the EU General Data Protection Regulation takes effect globally, more than half of US-based employees in various industries have never heard of the upcoming regulation, according to a survey by adaptive training experts at MediaPro.

Read More

What are your 2018 cybersecurity intentions?

Jan 10 by George V. Hulme

With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively.

Read More

Six ways security teams sabotage their own plans

Jan 08 by George V. Hulme

It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own.

Read More

Meltdown and Spectre: decades-old CPU design flaws put businesses at risk

Jan 05 by Filip Truta

Security researchers at Google this week made public two vulnerabilities in almost every modern processor shipped since 1995 that could allow attackers to steal passwords, encryption keys and other sensitive information.

Read More

Nutanix Your Way to VDI Xen with Bitdefender

Jan 05 by Shaun Donaldson

In the technology world, it is rare that three uniquely positioned vendors converge to provide a common solution which addresses security, performance, and operational benefits as Bitdefender, Citrix, and Nutanix have around Virtual Desktop Infrastructure (VDI).

Read More

Need container and microservice security? Automation Is Key

Jan 02 by George V. Hulme

When it comes to enterprise security, cloud was supposed to help simplify security efforts. But it didn’t turn out that way. Today, the typical large enterprise has its legacy environments, public clouds, private clouds, private hosted clouds, and various hybrid flavors of each to secure. And within those systems applications are becoming containerized, and broken into many different discrete services. All of this is not only fundamentally changing the way enterprises must secure their environments, but also significantly increasing the complexity in doing so.

Read More

Get more value from your threat intelligence

Dec 27 by George V. Hulme

Many cybersecurity organizations are of the opinion that threat intelligence can prevent, or if not prevent entirely at least lessen, the impact of successful breaches.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets