Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

The story of GoldenEye In Seven Tweets

Jun 29 by George V. Hulme

A substantial ransomware attack rocked many organizations throughout Europe and the United States this week. Here are seven of the best Tweets Tweeted about GoldenEye / PetrWrap

Read More

UK businesses not deterred by cyber-threats; want gov’t to help with cloud adoption

Jun 28 by Filip Truta

As Britain leaves the European Union, businesses in the sovereign state want financially stable cloud providers and prefer those that store data locally and offer local support, according to a recent survey.

Read More

Aligning executives and the business? Communication is key

Jun 27 by George V. Hulme

In our previous post we talked about the importance of the role of the CISO when it comes to helping organizations to maintain solid security programs and maintain alignment between what an enterprise decides its security posture should be and the personnel, technical, and process controls that need to be in place to enforce that policy.

Read More

Businesses pursue new tech without equal attention to cyber threats

Jun 26 by Filip Truta

A Deloitte survey of 400 executives in the consumer product segment indicates that businesses are confident they can fight cybercrime, but at the same time they are ill prepared to do so. Going by the numbers, business execs indeed have a ways to go to protect customer trust, intellectual property, payments and human capital.

Read More

WannaCry hits Honda factory in Japan, 55 traffic cameras in Australia

Jun 22 by Luana Pascu

The WannaCry ransomware family took only 24 hours to infect 200,000 computers in over 100 countries last month, affecting companies such as Renault, Nissan, Telefonica Spain, FedEx and more than 40 hospitals in the UK. Researchers around the world were surprised how fast the malware spread without user interaction as a result of outdated Windows versions and inefficient security solutions.

Read More

South Korean web host pays historical ransom of $1M

Jun 21 by Luana Pascu

Small and medium-sized business have become top targets for ransomware attacks as a result of poor security, a willingness to quickly give in to ransom demands and ransomware-as-a-service business model, according to a Bitdefender survey.

Read More

Many companies have been ‘hacked’, but please don’t make it THIS easy

Jun 20 by Graham Cluley

Hacking is never far from the news these days.

Read More

Five ways your CISO has saved your cyber

Jun 19 by George V. Hulme

Let’s face it, being a CISO can be one of the most thankless jobs in the c-Suite. I’m sure there are many security professionals who will say it is in fact the most thankless job in the c-suite.

Read More

Ransomware targets US SMBs due to weaker protection and greater willingness to pay up

Jun 15 by Razvan Muresan

Attackers are now targeting small and medium businesses to extort higher fees, a Bitdefender survey shows, meeting the company’s predictions for 2017.

Read More

Two-thirds of French CISOs say their companies could ‘definitely’ be a target of cyberespionage

Jun 14 by Razvan Muresan

More than two-thirds (71 percent) of IT security decision makers in France say their companies could ‘definitely’ be a target of cyberespionage campaigns using advanced persistent threats (APTs), according to a recent survey by security firm Bitdefender. These complex cyber tools are crafted for high-profile entities and operate by silently gathering sensitive data over long periods. Another 27 percent of respondents say their IT infrastructure could ‘possibly’ be targeted in high-level cyberespionage actions that exfiltrate intelligence systematically.

Read More

Survey: sensitive data companies would never move in the cloud

Jun 13 by Razvan Muresan

Companies care most about information related to clients (i.e. credit cards, demographics, contracts) and employees (i.e. income, salary, service fees, contact information, stakeholders), research data about new products and competition, and financial information, as shown in a Bitdefender survey of more than 500 IT decision makers

Read More

Top reasons why most companies choose a mix of cloud services and privately owned data centers

Jun 12 by Razvan Muresan

Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment. Most companies choose to virtualize more hardware by substituting it with less expensive and more versatile software, as shown in a Bitdefender survey of more than 500 IT decision makers. US IT decision makers say hybrid environments allow more flexibility and room for expansion, while they also increase productivity and security. 

Read More

APT-powered cyberespionage becomes British companies’ worst nightmare

Jun 09 by Razvan Muresan

• Reputational, financial costs seen as worst consequences of APTs

• IT execs perceive competitors as the main interested parties that could target their organisations

• Most companies have an incident response plan for advanced persistent threats, but underestimate the complexity of targeted attacks

Read More

New Study Looks at the Challenges IT Faces in an Increasingly Cloud-Focused World

Jun 08 by Razvan Muresan

We’re getting to the point where it’s nearly impossible to differentiate between “IT infrastructure” and “cloud.” Organizations continue to shift data and workloads to cloud services, whether they’re private clouds that have emerged from virtualized data centers, private cloud services from a vendor or hosted public clouds offered by service providers.

Read More

How trust affects cloud adoption and security decisions in the US, the UK and Germany

Jun 07 by Razvan Muresan

A recent Bitdefender survey shows that trust is vital when companies choose a cloud provider. Most respondents place greater trust in suppliers from their own country.

Read More

The importance of the CISO

Jun 06 by George V. Hulme

There are only a few things guaranteed in life: death, taxes and data breaches. OK, I embellished that last one, but it sure seems that way does it?

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month