Advanced persistent threats (APTs) have once again made it into the spotlight with the latest cyberattacks associated with APT28, also known as Fancy Bear or Sofacy. The Kremlin-sponsored hacking group behind the Democratic Party breach scandal, the attacks against NATO or those on French TV network TV5 is now shifting attention towards Europe. Earlier this week the campaign of Emmanuel Macron, favorite to become France's next president, was allegedly targeted by the same cyber espionage group.
All about Virtualization and Cloud Security | Recent Articles:
APTs and zero-days among top security concerns for IT pros, Bitdefender survey shows
Few industries impact as many people and businesses around the world as the power and utilities sector. Virtually everyone relies on electricity on a daily basis, and to go without power can be a major hardship. Just ask anyone who has experienced an outage. From a business standpoint, a loss of power even for a few hours can deal a significant blow to operations.
Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates.
Businesses falling short when it comes to cybersecurity, says Government report
A "sizable proportion" of businesses have still not put in place basic protection and policies to protect themselves from attack.
Some six percent of Europeans per day use credit cards online, mostly to buy clothes and shoes, according to Masterindex statistics. Although more and more consumers show interest in online payments, they worry about fraud, which could slow down ecommerce globally.
Last Friday (April 14, 2017), just before Easter, an egg was laid by The Shadow Brokers, a group that hopped into the spotlight in mid-2016. This time, the group dropped an especially colorful release, in the form of Eternalblue.
Corporate boards are still struggling to meet cybersecurity challenges, survey shows
Some 59% of directors report that their boards find it challenging to oversee cyber risk, and only 19% report that their boards possess a high level of knowledge about cybersecurity, according to a study by the National Association of Corporate Directors.
Half of IT execs in the US see cloud as more secure than on-premise infrastructure
Some 53 percent of IT execs in the US perceive cloud as more secure than on-premise infrastructure, while the majority in Germany and the UK trust their own data centers most, according to a Bitdefender survey of more than 500 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs.
The Rise of Ransomware, and What Enterprises Can Do to Protect Against Attacks
Enterprise security and IT executives who are not concerned about ransomware threats today are probably in the midst of some sort of denial.
Most organizations will adopt hybrid infrastructure management by 2020, Gartner says
Some 90 percent of organizations will shift massively toward hybrid infrastructure capabilities in the next three years, according to advisory company Gartner. The shift reinforces the growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO).
As Bogdan Botezatu wrote in his post Here Come Software-Defined Data Centers - What are the Security Implications? — the software defined data center is here to stay and is expected to grow from $25.61 billion in 2016 to $83.21 billion by 2021, at nearly a growth rate of about 30% annually.
When companies suffer a data breach, employees are usually key in enabling hackers to access to the infrastructure to steal sensitive information. In spite of billion-dollar efforts to bolster corporate security and educate employees, Internet users in the US still have little knowledge about basic cybersecurity, according to a recent Pew Research survey.
Organizations have been facing an increase in sophisticated cyberattacks attributed to governments or corporate and financial espionage. What’s striking is that it takes companies an average of 5 months to detect a data breach, easily enough to incur even crippling losses.
We’ve been starting to write more about the software-defined data center here at Business Insights because it’s become clear this is where enterprise networks are quickly moving. While software-defined networking gets all of the headlines — Network Functions Virtualization (NFV) is a big part of the software-defined data center.
Federal Agencies Already Deployed Software Defined Datacenters to Boost Agility and Flexibility
While software defined data centers (SDDC) are believed to be the future of data centers, companies have already begun implementing or planning their growth strategies to encompass this trend.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (6)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)