Quantum computing may sound like science fiction, but it's coming down the pike faster than you might expect. And if security practitioners don't start taking this impending advancement seriously now, they could be facing the wholesale obscelesence of their corporate cryptographic protections within a decade.
All about Virtualization and Cloud Security | Recent Articles:
Government CIOs have a full agenda for 2018, including top investments in cloud services (19%), cybersecurity (17%) and big data analytics (16%), according to Gartner’s 2018 CIO Agenda Survey. The predictions are based on interviews with 3,160 CIOs from 98 countries, including 461 who work in government institutions.
When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an Internet of Things (IoT)-powered botnet, cybersecurity experts warned that this was just the warm-up act. Mirai marked the first splashy real-world example of the kind of attacks that the bad guys could carry out when harnessing the power of IoT devices in a well-controlled botnet. And as predicted by experts following the rollout of Mirai, the hits just keep coming via IoT botnets.
Businesses rushing to adopt new tech are opening more doors to hackers – research
While modern technology makes possible new business models to drive growth and profitability, digital transformation opens your business to more cybersecurity risks, according to a survey by Thales and 451 Research.
There’s an old joke that goes something like this: “To err is human, but to really screw things up you’ll need a computer.”
SCMagazine’s Innovator Award for Bitdefender Hypervisor Introspection Marks Solution Milestone
Bitdefender Hypervisor Introspection recently won the SCMagazine Innovator Award, marking the fact that truly groundbreaking security technologies have started to receive validation from the market, as traditional security solutions fail to cope with the ever-increasing complexity of advanced threats.
The last year has proved out about security naysayers' warnings about the undisciplined use of cloud architectures. While many organizations work hard to secure data stored on cloud stores, the truth is that there's a lot of work to go. That fact is made abundantly clear by the growing number of incidents caused by extremely poor security hygiene within Amazon Simple Storage Service (S3) storage buckets that are holding very sensitive information.
2018 is the year that IoT, as well as artificial intelligence and robotics, will drive digital innovation and completely transform business models, found a Forbes Insights survey of over 500 senior executives from different countries.
US Commerce on Security and Market Incentives — Consumers don’t want security
In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.
Any organization could be the target of a data breach in 2018, digital identity experts say
Fraudsters have moved from making a fast buck to crafting more ambitious, targeted attacks that produce long-term profits, according to an extensive analysis of real-world cybercrime attacks.
Data protection is a prime concern for Italian IT execs that embrace data center modernization
Italian IT decision makers perceive security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a prime concern.
A survey of 612 Chief Information Security Officers suggests CISOs have a tough road ahead in an ongoing climate of high-profile data breaches.
A Key Questions as U.S. Federal Government Agencies Move Further Into the Cloud: How to Manage and Secure Their New Hybrid Environments
U.S. federal government agencies today are among the biggest users of cloud services. This is a result of years of effort to shift data and workloads to the cloud in order to reduce spending and increase efficiency.
Just months before the EU General Data Protection Regulation takes effect globally, more than half of US-based employees in various industries have never heard of the upcoming regulation, according to a survey by adaptive training experts at MediaPro.
With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively.
It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own.
Security researchers at Google this week made public two vulnerabilities in almost every modern processor shipped since 1995 that could allow attackers to steal passwords, encryption keys and other sensitive information.
In the technology world, it is rare that three uniquely positioned vendors converge to provide a common solution which addresses security, performance, and operational benefits as Bitdefender, Citrix, and Nutanix have around Virtual Desktop Infrastructure (VDI).
When it comes to enterprise security, cloud was supposed to help simplify security efforts. But it didn’t turn out that way. Today, the typical large enterprise has its legacy environments, public clouds, private clouds, private hosted clouds, and various hybrid flavors of each to secure. And within those systems applications are becoming containerized, and broken into many different discrete services. All of this is not only fundamentally changing the way enterprises must secure their environments, but also significantly increasing the complexity in doing so.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (3)
- APT (2)
- artificial intelligence (1)
- biometrics authentication (1)
- breach (2)
- bug bounty (1)
- BYOD (28)
- CIO (7)
- CIOs (5)
- CISO (15)
- Cloud Security (117)
- connected care (1)
- container security (1)
- corporate hijacking (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber-attack (5)
- cybersecurity awareness (20)
- data breach (30)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (9)
- EDR (3)
- endpoint detection and response (1)
- Endpoint Protection & Management (15)
- Enterprise Security (420)
- Equifax (2)
- Events (4)
- financial services (15)
- garter (1)
- GDPR (14)
- GDPR, Data Protection (7)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (4)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (10)
- identity theft (4)
- Industries (32)
- insider threats (11)
- Integration (2)
- IoT (10)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (12)
- memory introspection (12)
- Microsoft (3)
- Network Protection (9)
- power grid (3)
- ransomware (7)
- ransomware, HVI (3)
- report (1)
- Security as a Service (15)
- Security Threats (57)
- SMB Security (41)
- Software-defined-datacenter (5)
- telecommunications (2)
- Virtualization & Data Center Security (69)
- vulnerability disclosure policy (1)
- WDATP (1)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2019 (14)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)