The healthcare industry is under fire these days. Hospitals are falling victim to a cyber-epidemic that is paralyzing their systems and asking for huge ransoms in return.
All about Virtualization and Cloud Security | Recent Articles:
Cybersecurity has become a major topic of discussion for businesses and organizations of all sizes, as the number of security incidents has spiked, capturing headlines worldwide.
Boards’ New Approach to Cybersecurity: a Risk Management Issue, Not Just a Niche IT Concern
C-level managers and directors, increasingly concerned about the legal and financial implications of security breaches, have started to set up regular meetings and to participate in the overall security strategy.
This is a good time to be a managed security services provider—if you believe industry reports about the robust growth of the market. Even if you don’t believe the research, there is plenty of evidence that many organizations are looking for expert help when it comes to strengthening their security posture against a host of potential threats. And service providers can provide that needed assistance.
Enterprise-Targeted Botnets: the Biggest Threat for Your Company Is the Main Cash Cow for Hackers
As security companies and law enforcement take enhanced security measures to disrupt botnet activity, cybercrime organizations continue to improve command & control techniques to increase the ROI of their sophisticated botnets.
The enterprise environment has changed drastically over the past couple of years, with organizations relying on both physical and virtual environments deployed either in private or public clouds to improve service availability or boost business capabilities.
Organizations are continually striving to make their data centers more energy efficient, while at the same time ensuring high performance and strong security. This can be a challenge for CIOs and data center administrators—to say the least. But it’s an important goal in a business environment that calls for efficient IT operations, rapid response to end-user and customer demand for processing and the protection of critical information resources against intrusions.
In 2010, cloud adoption among US small medium businesses (SMBs) was just 5 percent—today, 37 percent are on the cloud, and the percentage will double by 2020, according to Forbes.
Microsoft really really wants your business to upgrade to Windows 10 as soon as possible.
In fact, they are so keen that your firm switches to Windows 10 that they’re sneaking adverts for the upgrade into security patches, and using some controversial tactics to encourage users into shaming their system administrators for not allowing the upgrade to happen.
Putting Customers First Today Means Protecting Them and Their Data At All Costs
Customer-centric business strategies should focus not only on satisfying clients’ needs and delivering the best products or services in the market but also on securing the sensitive data of those who trust buying from you. Managers know how difficult it is to earn customers’ trust and how easy is to lose it by committing a major mistake such as exposing all their habits.
Data protection regulations from the European Parliament and Council have been set in place to safeguard the individual’s right to control how his personal data is used and prevent companies from getting tangled in a legislative web.
Women in Security Moving Up the Ranks, but Still Small Percentage of Overall Cybersecurity Workforce
The good news is women are moving up in the ranks in the field, but the bad news is that women in the information security field comprise just 10% of the workforce. That’s according to The 2015 (ISC)² Global Information Security Workforce Study conducted by Frost and Sullivan in partnership with (ISC)² and Booz Allen Hamilton.
Two years ago, the world rushed to say the antivirus industry is dead. I disagree simply because antivirus companies do not exist anymore. I haven’t seen a security company that limits its portfolio to one, traditional security (antivirus) solution. Those who’ve tried are dead and gone, but most of them have morphed into cybersecurity companies.
After several years of peeking through the programming as a very niche topic at RSA Conference, DevOps has broken through to the limelight this week. The show has featured a number of talks and panels that discussed the security implications of DevOps and the corresponding increased dependence on cloud platforms and containerization in delivering IT services.
Every organization has faced the dilemma of convenience over security and most have compromised on either one or the other. While the information security triad of integrity, confidentiality and availability has been regarded as the mantra of CSOs, convenience has constantly played an important role in both productivity and operations.
Cloud Security
Virtualization Security
Subscribe to Blog Updates
Posts by Categories
- breach (2)
- BYOD (28)
- CIO (7)
- CISO (7)
- Cloud Security (114)
- connected care (1)
- credit card (2)
- cryptocurrency (3)
- cryptojacking (1)
- cryptomining (1)
- Cyber Security Awareness Month (5)
- cyber-attack (2)
- cybersecurity awareness (7)
- data breach (18)
- Data Protection (75)
- data protection act (2)
- datacenter (2)
- DevOps (9)
- Endpoint Protection & Management (14)
- Enterprise Security (398)
- Equifax (2)
- financial services (7)
- garter (1)
- GDPR (14)
- GDPR, Data Protection (2)
- General Data Protection Regulation (3)
- GiTEX (1)
- Healthcare (2)
- hyperconverged infrastructure (1)
- hypervisor (14)
- hypervisor introspection (10)
- identity theft (2)
- Industries (31)
- insider threats (3)
- Integration (2)
- IoT (3)
- IoT, Policy, security (6)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (3)
- malware, threats (5)
- memory introspection (12)
- Microsoft (1)
- Network Protection (9)
- ransomware (3)
- ransomware, HVI (3)
- report (1)
- Security as a Service (15)
- Security Threats (54)
- SMB Security (39)
- Software-defined-datacenter (4)
- Virtualization & Data Center Security (69)
- WDATP (1)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2018 (15)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)