Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Researchers Reveal the Countries Most Targeted by Cyberattacks

Jul 14 by Silviu Stahie

A study using data from the Center for Strategic and International Studies (CSIS) looked at how cyberattacks are distributed across the globe and the most common techniques used in cyberattacks. 

Read More

Most Companies Now Accept BYOD Policies But 30% Don’t Use Endpoint Protection for Those Devices

Jul 13 by Silviu Stahie

Bring your own device (BYOD) policies are changing around the world, and the latest report by Bitglass shows that companies are now much more permissive in this regard, although the shift is likely caused by necessity and not choice. 

Read More

One in 2 Companies Unable to Cope with Remote Work Security Risks

Jul 10 by Filip Truta

Half of infosec professionals in a recent Bitdefender study revealed that their organization doesn’t have a contingency plan in place, or didn’t know if they did, for a situation like COVID-19 or a similar scenario.

Read More

The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD

Jul 09 by Filip Truta

Most IT professionals say employees are allowed to use personal devices for work. And while the use of personal devices at work is growing rapidly, many are unprepared to balance productivity with security, new data shows.

Read More

Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats

Jul 09 by Andrei Pisau

While the media have extensively covered the recent spike in malware, a certain aspect seems to have been downplayed. The truth is, not only have cyber-attacks grown significantly during the pandemic (in March alone, 832 million records were breached through malware), but their complexity has also visibly increased as well.

Read More

US Secret Service Warns of Attacks on MSPs

Jul 08 by Silviu Stahie

The United States Secret Service issued an advisory warning of an increase in cyberattacks against managed service providers (MSP) in an effort to compromise companies using their services. 

Read More

Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

Jul 07 by Filip Truta

Organizations with a dedicated security operations center (SOC) know how much it helps combating cyber threats. 72% of IT security practitioners in organizations with a SOC categorize the unit as “essential” or “very important” to their organization’s cybersecurity strategy. However, 60% of SOC team members are considering changing careers or quitting due to stress.

Read More

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

Jul 06 by Silviu Stahie

Most Chief Information Officers (CIO) are worried about the security risks associated with the proliferation of TLS machine identities, which is aggravated by the fact that many of them don’t have an accurate account of the number of certificates deployed in their infrastructure. 

Read More

Are Companies Ready for the Risks of IoT?

Jul 04 by Bob Violino

The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, vehicles, buildings, and other objects are being equipped with sensors and connected, enabling the sharing of data that provides useful insights for businesses.

Read More

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

Jul 03 by Silviu Stahie

A scan of the Japanese Internet infrastructure showed how many devices could be compromised with common user names and passwords, and ISPs helped the authorities make that determination. But ISPs also seemed to lack the tools to make those determinations by themselves, in a way that secures their networks and customers at the same time.

Read More

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

Jul 03 by Silviu Stahie

The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an advisory for companies regarding the detection and mitigation of malicious traffic coming from Tor (The Onion Router.) 

Read More

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

Jul 02 by Ericka Chickowski

Recent studies show that the modern SOC has evolved to become the lynchpin for most enterprise security strategies. Organizations spend a significant chunk of their security budget on SOC operations and many depend upon the SOC to help them detect and hunt for threats, respond to incidents, and maintain visibility into the organization's cyber risk posture. However, SOC effectiveness still varies greatly from organization to organization.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets