Wrongly considered the new kid on the block by some enterprises, virtualization technology has been around for a decade and embraced by many technology-oriented businesses due to its flexibility and room for expansion, increased productivity, superior storage capacity, and lower costs, among others.
All about Virtualization and Cloud Security | Recent Articles:
86 Percent Increase in Data Breaches in 2016 Led to 1.4 Billion Data Record Compromised
More than 1.4 billion data records are estimated to have been compromised in 2016 as a direct result of data breaches, spawning an 86 percent increase compared to 2015, according to a Gemalto’s Breach Level Index. With organizations continuously being targeted by cybercriminals either with sophisticated advanced threats or through infrastructure vulnerabilities, the main driver behind these attacks is often related to financial gains or gratification.
Here Come Software-Defined Data Centers - What are the Security Implications?
For many enterprises, the software-defined data canter (SDDC) is the IT infrastructure of the future. And for innovative organizations it’s the data center of the present. Either way, SDDC offers a number of compelling potential benefits compared with traditional data center environments, such as reduced costs and greater agility.
In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. Ransomware is among the worst types of infection, as it not only encrypts network data, but in the end may cost victims all their data – even if they pay the ransom. It should be a priority for all businesses and organizations in 2017.
A vital, actually a most fundamental, aspect of enterprise security is helping organizations to keep confidential information confidential. This is why security at the data and document level is something to which much more attention should be paid by enterprises.
Recent surveys have revealed that 34 percent of companies have been breached in the past 12 months alone, with 74 percent of IT decision makers claiming they have little to no clue as to how the breach occurred.
Stop shifting the blame onto third parties. That breach is still your firm’s responsibility
If it’s data that your customers gave you that’s breached, it’s your responsibility.
Shortage of IT security professionals to reach 1.8 million by 2022, survey shows
Companies will face a shortage of 1.8 million qualified information security personnel by 2022, according to a survey by Booz Allen Hamilton Holding Corp. and ISC2.
A third of Fortune 100 boards currently include a director who is a CIO. According to unpublished Korn Ferry data, cited by Harvard Business Review, the number of CIOs serving on Fortune 100 boards has increased 74% in the past two years.
Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020, according to advisory firm Gartner. Spending on enhancing detection and response capabilities will likely be a key priority for security buyers through 2020.
Most IT pros expect an increase in attacks on security of industrial IoT, survey shows
Some 96 percent of IT professionals expect an increase in attacks on the security of industrial IoT (IIoT), a recent survey shows.
The hits to the healthcare industry keep on coming. While the number of overall data breaches tracked by the Identity Theft Resource Center (ITRC) hit a record in 2016, with 1,093, which is a 40 percent increase over the previous record in 2015 of 780 breaches – It’s healthcare that continues to grow the most.
Epic Yahoo Data Breaches Lead to Big Drop in Value Prior to Planned Acquisition By Verizon
The good news for Internet entertainment, news and search site Yahoo Inc. is that Verizon Communications Inc. is still interested in acquiring the company following its disclosure of massive data breaches. The bad news is that the value of the deal has dropped precipitously after the security incidents became public knowledge.
Clouds, Containers, & Cybersecurity Skills Gap Drive Security Services Demands
When it comes to the business of information security, and the big technology trends that will likely shape the year ahead, the RSA Conference is perhaps the most important event of the year. And with a record attendance of more than 43,000, this year was no exception.
Some 12 percent of companies in Germany were breached in the past year, and most IT decision makers don’t know how their company was breached, according to a Bitdefender survey of 100 German respondents.
Shadow IT Back in Spotlight
When it comes to shadow IT, government can face just as much of a challenge as the typical enterprise. Last week, the Office of Inspector General (OIG) for the General Services Administration (GSA) published a report which found that GSA’s Office of 18F had “routinely disregarded and circumvented fundamental security policies and guidelines.”
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)