- IoT manufacturers often favor speed of rollout over security
- Attackers don’t have to work too hard to compromise smart devices
- It’s up to users and ISPs to protect homes and network infrastructure
All about Virtualization and Cloud Security | Recent Articles:
- An overwhelming majority of business and technology executives worldwide plan to shift their cyber security strategies due to the pandemic, according to a new study.
- One of the most prominent trends has been an accelerated push to digital transformation, and this has had a big impact on cyber security.
- The role of the CISO has never been more critical to organizations’ survival and growth.
- Remote workers have become lucrative ground for lurking cybercriminals
- Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages
- IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit
- The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation
- Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures
- 80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans
- IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern
- Digitally mature organizations stand out in their frequency of performing technology audit risk assessments
- 67% of organizations do not classify themselves as digital leaders
- ‘Cyber breaches’ are consistently a primary concern across key industry sectors
- Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
- Five key factors are influencing the cyber threat landscape.
- By taking certain steps, organizations can build a more security and agile environment.
Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring
Jan 03
by
George V. Hulme
- Not enough organizations are continuously looking for risks in their IT assets.
- Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
- Enterprises need to put monitoring regimes in place that can keep pace with technological change.
- To fix a problem you first need to know of its existence
- IoT devices are often the target of malware botnets and campaigns
- ISPs need to deal with IoT security from a much broader perspective
Most Companies in US and Canada Gather User Data through Third-Party Code without Telling Customers, Survey Finds
Dec 29
by
Silviu Stahie
- Advertisers usually use gathered data to better target customers
- Most companies allow some sort of user tracking
- The more money companies makes from ad revenue, the laxer the rules governing data gathering
ICO Calls on UK Businesses to Ensure Lawful Flow of Data Under GDPR as Brexit Transition Period Ends
Dec 28
by
Filip Truta
- SMEs must check whether they are impacted before the end of the UK’s transition period with the EU
- Watchdog offers guidance and resources on the actions they may need to take if they use personal data
- Update offers a reminder of what personally identifiable information (PII) is and how it’s classified
- 59% of employed Americans are more concerned about creating a strong password for personal accounts than work accounts
- 70% of remote workers don’t consider it their responsibility to keep their corporate account secure
- Organizations are behind in educating their employees on the risks associated with a compromised corporate account
- Human Risk Analytics enables IT admins to stay afloat of insider threats
Organizations Relied More in 2020 on Crowdsourced Cybersecurity, Report Finds
Dec 24
by
Silviu Stahie
- Companies need bug bounty platforms now more than ever
- The increase in the number of threats in 2020 pushed companies to secure their products better
- Human error is a main source of cyber risk
Poor Security Habits Might Force Companies to Bring Employees Back to the Office
Dec 23
by
Filip Truta
- 69% admit to using corporate devices for personal use
- 57% say they allow other members of their household to use their corporate devices for schoolwork, gaming and shopping
- 82% admit to reusing passwords
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (5)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)