Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Knowing is Half the Battle: Leaner, cleaner, more accessible intelligence through TAXII and STIX

Oct 21 by Andrei Pisau

In the world of cybercrime, like in the physical world, the thief is often caught only after he makes off with the loot. With the advent of massive malware networks and ransomware groups, both internal teams and security providers often find themselves overwhelmed by the number and diversity of attacks. No single unit can detect all relevant threats and stop them before they damage valuable data or infrastructure.

Read More

Companies Place Cyber Security in the Spotlight

Oct 21 by Bob Violino

New research shows that cyber security is taking center stage at many organizations. A pessimistic way of looking at this would be to acknowledge that things have gotten so bad with breaches, malware, and other incidents that enterprises have no choice but to focus on security.

Read More

Few Companies Restrict Use of Unencrypted or Unsafe USB Drives

Oct 18 by Silviu Stahie

Most companies neglect creation of comprehensive data security protocols for employees, allowing them to use unsafe or unsecured USB drives that could be compromised.

Read More

One in Five SMBs Hit by Ransomware in 2019

Oct 17 by Silviu Stahie

Ransomware attacks continue to focus on small and medium businesses (SMBs), according to a 2019 Datto survey. Companies are now more exposed than ever, and the trend shows an increase in attack frequency if organizations continue to shirk online security measures.

Read More

Security: It's Still About the People

Oct 16 by George V. Hulme

According to the most recent Notifiable Data Breaches Report published by the Office of the Australian Information Commissioner (OAIC) data breaches rose considerable in the most recent quarterly reporting period.

Read More

First Impressions and Cybersecurity

Oct 15 by George V. Hulme

Some say first impressions aren’t everything, and in many cases first impressions can be wrong. But they certainly are powerful, and bad first impressions can be difficult to overcome. This is true for friendships, dating, potential business partners, and more.

Read More

Most Employees Receive No Social Engineering Awareness Training

Oct 14 by Silviu Stahie

The majority of employees receive no social engineering awareness training, leaving them vulnerable to phishing and other types of social engineering tactics. Knowledgeable employees, research shows, are the first line of defense for a modern company.

Read More

Organizations Fail to Implement Cloud Security Basics – And it Bites Them

Oct 12 by George V. Hulme

While the early promises in the move to cloud computing promised to simplify cloud management and security, and in many ways these promises have been kept. However, in other ways, cloud environments have increased security complexity. In fact, according to a recent survey, 84% of security professionals report that their organizations struggle to maintain secure cloud configurations.

Read More

Insider Threat Is Still the Biggest Danger for Companies – Data Loss Prevention Is Not Working

Oct 11 by Silviu Stahie

Companies should pay a lot more attention to insider threats when they establish a strategy to keep their data safe. It turns out that more than half of data breaches can be attributed to employee actions and not outside forces.

Read More

Attack Surface Management: The New Endpoint Security Essential

High-profile security breaches come every week, creating a guessing game of who will make the headlines next. Recent compromises include EquifaxMarriot, and British Airways, which just received the largest fine in GDPR history for the breach of its customer financial data.

Read More

Online Security Guidelines for Business Safety

Oct 09 by Silviu Stahie

Just like people, companies need to safeguard against online attacks, but the stakes are much higher. Corporate strategies vary, depending on the activity, but one thing is certain – they can’t pretend online threats are unimportant.

Read More

Yes, MFA Isn't Perfect. But That's Not a Reason for Your Company Not to Use It

Oct 08 by Graham Cluley

When computer users and businesses ask me for a single step they could take to dramatically enhance their security it's easy to answer: enable multi-factor authentication.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets