Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

"Unauthorised code" on Juniper firewalls gives attackers admin access, decrypts VPN traffic

Dec 18 by Graham Cluley

With many companies shutting down for the holidays, chances are that the IT team at your business are running - if anything - a skeleton staff and many are hoping to have a relaxing Christmas and New Year break.

Read More

Are employees’ smartphones putting your business at risk?

Dec 16 by Alexandra Gheorghe

The shift toward using personal computing devices (laptops, tablets, smartphones and now wearables) to conduct business seems like a win-win strategy for both the enterprise and its employees. Employees work from the comfort of their own device while employers enjoy increased productivity and reduced technology costs.

Read More

Study Shows that Organizations are Putting More Money, Senior Management Focus into Cyber Security

Dec 11 by Shaun Donaldson

The latest “State of Information Security Survey” from consulting firm PcW sheds some new light on what organizations are doing to protect their data assets from hacker attacks and other incidents. And it helps to illustrate how cyber security has become a top-of-mind consideration for business leaders as they try to stay a step ahead of the bad actors.

Read More

Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies

Dec 07 by Bogdan Dumitru

With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what 2016 may bring for the security industry, the online criminal underworld, and corporate and private consumers. 

Read More

Worst-case scenario: state-sponsored attackers hack your company

Dec 07 by Razvan Muresan

CIOs and CISOs face each day the fear of internal and external threats from criminal syndicates, employees, external contractors or hacktivists that could damage their company’s reputation. But what happens when a government agency wants to affect your business forecast and learn all your secrets? This concern is real and increasing -- state-sponsored attacks rank sixth among the most likely sources of attacks on a company, cited by 35% of the respondents in a recent survey, compared with 27% in 2014.

Read More

Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance

Dec 02 by Ericka Chickowski

Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to turn it up a notch sometimes and call it rogue IT. Many IT executives look at shadow IT as a disease. It’s scary and risky for end users to go out and get their own SaaS solutions without IT approval or knowledge. It’s even scarier and riskier when the DEV team goes out and spins up a bunch of Amazon instances to essentially stand up an entire shadow data center for some project or other.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month