A substantial ransomware attack rocked many organizations throughout Europe and the United States this week. Here are seven of the best Tweets Tweeted about GoldenEye / PetrWrap
All about Virtualization and Cloud Security | Recent Articles:
UK businesses not deterred by cyber-threats; want gov’t to help with cloud adoption
As Britain leaves the European Union, businesses in the sovereign state want financially stable cloud providers and prefer those that store data locally and offer local support, according to a recent survey.
In our previous post we talked about the importance of the role of the CISO when it comes to helping organizations to maintain solid security programs and maintain alignment between what an enterprise decides its security posture should be and the personnel, technical, and process controls that need to be in place to enforce that policy.
A Deloitte survey of 400 executives in the consumer product segment indicates that businesses are confident they can fight cybercrime, but at the same time they are ill prepared to do so. Going by the numbers, business execs indeed have a ways to go to protect customer trust, intellectual property, payments and human capital.
The WannaCry ransomware family took only 24 hours to infect 200,000 computers in over 100 countries last month, affecting companies such as Renault, Nissan, Telefonica Spain, FedEx and more than 40 hospitals in the UK. Researchers around the world were surprised how fast the malware spread without user interaction as a result of outdated Windows versions and inefficient security solutions.
Small and medium-sized business have become top targets for ransomware attacks as a result of poor security, a willingness to quickly give in to ransom demands and ransomware-as-a-service business model, according to a Bitdefender survey.
Hacking is never far from the news these days.
Let’s face it, being a CISO can be one of the most thankless jobs in the c-Suite. I’m sure there are many security professionals who will say it is in fact the most thankless job in the c-suite.
Ransomware targets US SMBs due to weaker protection and greater willingness to pay up
Attackers are now targeting small and medium businesses to extort higher fees, a Bitdefender survey shows, meeting the company’s predictions for 2017.
Two-thirds of French CISOs say their companies could ‘definitely’ be a target of cyberespionage
More than two-thirds (71 percent) of IT security decision makers in France say their companies could ‘definitely’ be a target of cyberespionage campaigns using advanced persistent threats (APTs), according to a recent survey by security firm Bitdefender. These complex cyber tools are crafted for high-profile entities and operate by silently gathering sensitive data over long periods. Another 27 percent of respondents say their IT infrastructure could ‘possibly’ be targeted in high-level cyberespionage actions that exfiltrate intelligence systematically.
Companies care most about information related to clients (i.e. credit cards, demographics, contracts) and employees (i.e. income, salary, service fees, contact information, stakeholders), research data about new products and competition, and financial information, as shown in a Bitdefender survey of more than 500 IT decision makers.
Top reasons why most companies choose a mix of cloud services and privately owned data centers
Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment. Most companies choose to virtualize more hardware by substituting it with less expensive and more versatile software, as shown in a Bitdefender survey of more than 500 IT decision makers. US IT decision makers say hybrid environments allow more flexibility and room for expansion, while they also increase productivity and security.
• Reputational, financial costs seen as worst consequences of APTs
• IT execs perceive competitors as the main interested parties that could target their organisations
• Most companies have an incident response plan for advanced persistent threats, but underestimate the complexity of targeted attacks
New Study Looks at the Challenges IT Faces in an Increasingly Cloud-Focused World
We’re getting to the point where it’s nearly impossible to differentiate between “IT infrastructure” and “cloud.” Organizations continue to shift data and workloads to cloud services, whether they’re private clouds that have emerged from virtualized data centers, private cloud services from a vendor or hosted public clouds offered by service providers.
How trust affects cloud adoption and security decisions in the US, the UK and Germany
A recent Bitdefender survey shows that trust is vital when companies choose a cloud provider. Most respondents place greater trust in suppliers from their own country.
The importance of the CISO
There are only a few things guaranteed in life: death, taxes and data breaches. OK, I embellished that last one, but it sure seems that way does it?
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (6)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)