Six in 10 companies have purchased cybersecurity insurance in the past year, helping make the cybersecurity insurance sector the fastest-growing in the insurance market, pacing with the IT security global expenditures.
All about Virtualization and Cloud Security | Recent Articles:
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about the safety of the internet. More than 97 percent of web servers run some Linux OS distribution, and the new threat of Linux ransomware brings with it a whole new element to the danger.
BlackBerry, once the darling of corporations the world over, is trying to rebuild itself and seize marketshare back from the iPhone and Android smartphones that have so dramatically overtaken it in recent years.
Chief information security officers will become more important in companies’ hierarchies as CEOs and board members face increasing internal and external security risks that could ruin customers’ trust and business forecasts, yet C-level executives exclude CISOs from business decision-making.
Today’s interconnected world leaves everyone vulnerable to threats that can use the internet as a pipeline to reach any computer, any device, and any internet-connected gadget to steal data or compromise their integrity.
In the early years of building a business, a key trait of a leader is passion. Later, the leader must become more and more of an enabler, driving people to give their best. This is one of the first lessons that Florin Talpes, the CEO of Bitdefender, imparted to the young crowd gathered in Bucharest, for an AIESEC meeting.
A number of factors are creating a greater sense of urgency for IT security efforts at many organizations. High-profile data breaches, increased online transactions, existing and emerging regulatory mandates, increasingly sophisticated attacks and other factors are forcing business leaders to make data protection a higher priority than it has been.
The lack of cybersecurity talent relative to enterprise demand for it is strangling many enterprises’ ability to secure their organizations. That’s what I’m hearing, repeatedly, in my conversations with CIOs and CISOs alike. They lament how they are challenged to find the people they need to adequately defend and respond to attacks against and within their networks, as well as security analysts and architects. If you can communicate security risk in terms of business risk, know how to build defensible networks and applications, or understand how cloud and IoT are changing data and infrastructure risk, you are hardly in want for a job.
The don'ts - Where companies are so far wrong:
A major shortcoming of companies of all sizes is the lack of understanding of the value of files and documents, and therefore the need to protect them. Proper precautions, then, are also lacking. So attackers can access files that should actually be stored on separate networks or separate infrastructure.