Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Myriad point solutions for endpoint security – are you choosing chaos on purpose?

Aug 27 by Shaun Donaldson

Comprehensive security – that which spans as many endpoint types used by an organizations as possible – can be a challenge. With BYOD initiatives, virtualization, and public cloud, the variety of endpoints, which contain or have access to corporate data, is increasing.

Read More

3 Federal Trade Commission Cases That Taught Security Lessons The Hard Way

Aug 25 by Ericka Chickowski

The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert over the last decade for breach events that threaten consumer privacy due to the negligence of businesses.

Read More

Security for the cloud or security from the cloud? Planning for business

Aug 20 by Shaun Donaldson

There is a lot of talk about “cloud security”, but that simple phrase can mean many things. In general, we should split the conversation between: 1) security for cloud, and 2) security from the cloud. Within the latter, there are distinctions.

Read More

VMworld and the world of virtualization security

Aug 18 by Kathryn Schwab

VMworld USA is one of the largest events infrastructure and operations (and security) people look forward to every year in San Francisco. With this year’s theme “Ready For Any”, it is definitely a reflection of what we are doing at Bitdefender: we ARE ready for ‘any’ and protect it all in ‘one’.

Read More

The Biggest Risks Exposed at Black Hat 2015

Aug 12 by George V. Hulme

The years come and go, and the names of the security researchers shift around year to year, as do the form factors and devices where the vulnerabilities reside that

Read More

The 2015 Malvertising Malaise

Aug 11 by Ericka Chickowski

Revelations by security researchers this week are showing just how prevalent malicious advertising, better known as malvertising, has grown on the biggest publishing sites on the web. According to reports out from Black Hat, this year has seen nearly a three-fold

Read More

Know Your Threats

Aug 07 by George V. Hulme

Threat modeling helps enterprises manage risks more effectively and efficiently

Read More

Financial Companies to Provide Stronger Authentication Methods; How FIDO Works

Aug 01 by Razvan Muresan

Financial services companies have the most urgent need for safer payment methods as their clients demand privacy, security and convenience in all transactions, according to FIDO (Fast IDentity Online) Alliance

Read More