Some $86.4 billion has been spent globally on information security so far in 2017 alone, a 7 percent increase from 2016, according to Gartner. The forecast for 2018 is that the spending will reach $93 billion, making the Chief Information Security Officer a fundamental role in any organization.
All about Virtualization and Cloud Security | Recent Articles:
Cybersecurity regulations in force for financial sector in New York; CISOs play vital role
US, UK companies reported an average of five significant security incidents in the past year, survey shows
Four in ten companies in the US and the UK experienced five or more significant security incidents in the past year, among most cited external threats being malware, ransomware, and browser lockers (44%), phishing email, web or social (42%), domain infringement or DNS exposure/direct (42%), scams and disingenuous ads (40%), mobile app exposures and unknown or unauthorized rogue company mobile app (37%), and brand abuse and defacement (35%), according to a recent survey conducted by IDG.
Danish CISOs fear that hacktivists could attack their companies, survey shows
Danish IT execs perceive hacktivist entities and competitors as the main interested parties that could target their organisations, according to a recent Bitdefender survey. The study confirms that competitors interested in corporate espionage and foreign state-sponsored attackers come second and third, with 61 percent and 46 percent, respectively.
Among the riskier activities enterprises can undertake are merging with or acquiring other businesses—and not just for the financial considerations involved. Mergers and acquisitions (M&A) present a number of cyber security risks that might not even be on the radar screen when merger discussions first begin.
New data from Akamai Technologies reveals that distributed denial of service (DDoS) and web application attacks are on this rise following months of decline, increasing 28% in Q2 2017 from the same period last year.
Some 90 percent of boards of directors in the US address cybersecurity as a serious risk management issue with severe reputation and financial consequences, while only 8 percent haven’t done it so far, according to a recent Bitdefender survey.
An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.
One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject.
Organizations worldwide are on track to spend a cumulative $86.4 billion on information security products this year, a 7 percent increase over 2016, Gartner reports. The research firm anticipates that figure will climb to $93 billion in 2018.
It’s safe to say that the concept of the Internet of Things (IoT) has progressed to the point where a growing number of organizations are exploring the opportunities. What might not be so safe is the IoT itself; security remains one of the biggest concerns and challenges of implementations.
Taking a leaf from the EU’s book on data protection, the United Kingdom is preparing to introduce a new law that will see it aligned with the General Data Protection Regulation (GDPR), to be on par with the rest of Europe after it is no longer a member of the union.
Doing More with Less: Leveraging Virtualization and Hyperconvergence for IT Management
Virtualizations plays a critical role in today’s data centers, as it was designed to reduce operational costs while boosting performance and efficiency. The emergence of software-defined data centers (SDDC) and hyperconverged infrastructures (HCI) that rely on an extra abstraction layer enables faster provisioning of storage, compute and networking resources while offering IT admins an automation architecture through the use of APIs and policies.
Following GAO Report Detailing IoT Security Risks, Legislatures Proffer Plan to Harden IoT Devices
A bill introduced earlier this week in the United States Senate aims to bolster the security of Internet-connected devices by using the vast-purchasing power of the United States Government to enforce a baseline security standard.
Digitalization has brought new opportunities for companies and new challenges for IT teams. If legacy data centers were built around vendor-specific hardware, requiring dedicated manpower and software for maintenance, hyperconvergence (HCI) and today’s software-defined data centers (SDDC) introduce a new abstraction layer that turns hardware into a commodity.
Cloud security spending increased for 48 percent of the companies in the past year, while the IT security budget for other security activities remained the same, as shown in a Bitdefender survey of more than 500 IT decision makers.
Chief Financial Officers (CFOs) these days have a hard time balancing budgets and acquisitions, especially when it comes to security. While for a CIO or a CSO the decision to invest in security might seem like a no-brainer, CFOs have to evaluate security spending against other business costs. And security is often difficult to distinguish from IT operations if you’re not involved in either.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)