Anyone who works in the cyber security field probably knows how difficult it is for companies to fill security-related job openings. But the shortage has been made all the more worrisome, given the growing severity and frequency of attacks. And according to recent research, the shortage is getting worse.
All about Virtualization and Cloud Security | Recent Articles:
Enterprises Continue to Grapple with a Huge Cyber Security Skills Shortage
Ransomware is a growing threat to any organizations that rely on systems and data; in other words, just about any organization in the world.
When WannaCry ransomware hit in May, the world was bewildered. Who would have thought a Windows SMB protocol exploit would be used in a historical cyberattack that would cripple over 200,000 Windows computers from 150 countries, including 48 NHS hospitals and medical devices in the UK and similar facilities in the US.
A cybersecurity breach scandal involving the Swedish Transport Authority, Transportstyrelsen, erupted late last week and throughout the weekend according to numerous news reports.
When it comes to attaining readiness for General Data Protection Regulation (GDPR) the clock is ticking. The GDPR is a set of regulatory mandates (Regulation (EU) 2016/679) that seek to shore up and streamline data protections for citizens within the European Union, including providing residents control over data about them and limiting exports of such data outside the union.
Collaboration between Bitdefender, Europol, the FBI and the US Department of Justice has successfully ended with the takedown of Hansa, the global criminal marketplace. Operating on the Tor network, the dark net market distributed illegal goods and services, including guns and drugs.
Smart business – companies invest heavily in cloud security as cyber-threat grows
Businesses are growing increasingly aware of the security risks beyond the control of their cloud provider, according to new research by B2B ratings and reviews firm Clutch.
A catastrophic cyber attack could generate up $121 billion of economic losses, according to a report by cyber insurance company Lloyd's of London, cited by Reuters.
Loss of life, a concern for a fifth of CISOs fearing targeted cyberattacks, survey shows. Sweden ranks first
Some 75 percent of US CISOs state the worst consequences of an attacker gaining access to their companies’ most valuable asset would be the financial cost and reputational damage. However, few say the financial cost could lead to bankruptcy 35%.
More than a third of IT execs in Italy say bankruptcy could be the worst consequence of an advanced persistent threat (APT), according to a recent survey by security firm Bitdefender.
Firms that didn’t patch and enabled local admin rights continue to suffer post cyber-attack
Here’s a salutary reminder for all businesses.
Businesses in a wide swath of industries across the globe place too much trust in perimeter security solutions like firewalls, IDPS and content filtering, even though 28% of them suffered a breach in the past 12 months, according to a survey of 1,050 decisions makers. And new EU legislation will soon demand companies protect customer data, or else.
Many organizations believe that turning to cloud can help them better secure their environments, and many also contend that DevOps practices help them to better build secure software. While that is certainly debatable, a new survey of 929 IT professionals found that the majority believe that the best benefits come from combining DevOps and cloud.
Hackers going after critical energy infrastructure, warns U.S. Department of Homeland Security
The energy sector is vital for our industrial society to function properly. Fuel, electricity and petroleum sustain key industries, including agriculture and transportation. Should the world’s top 10 economies be concerned that cyber criminals could go after their critical infrastructure?
German IT execs perceive competitors as the main interested parties that could target their organisations, according to a recent survey by security firm Bitdefender.
The findings of a new ISACA research report on the state of cyber security are quite sobering: a huge majority of the organizations the group surveyed for its study expect to be hit with a cyber attack this year, but many of them remain unprepared to defend against such attacks.
WannaCry, GoldenEye ransomware waves ravage companies’ resistance to cyberattacks
Most data breaches, unsurprisingly, are easily avoidable. So why don’t more businesses focus on improving security? Misdirected emails, weak security, lack of employee training on the basics of online behavior and social engineering scams, all could be easily resolved and it would cost far less than fixing their entire computer network.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (6)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)