Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Most Organizations Lack Systems and Processes to Ensure GDPR Compliance, Survey Shows

Apr 30 by Filip Truta

When the EU confirmed plans to implement the General Data Protection Regulation (GDPR), organizations had more than a year to make the changes needed to ensure compliance.

Read More

Are You Ready for GDPR Compliance? Many Organizations Are Not

Apr 30 by Bogdan Botezatu

The deadline for one of the most highly publicized and impactful data privacy regulations in the world is approaching, and many companies are still not prepared.

Read More

Insider Threats Remain #1 Security Headache for Organizations, Research Shows

Apr 27 by Luana Pascu

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown and reputational damage. In the past year, 159 organizations from the United States, Canada, Europe, Middle East, Africa, and the Asia-Pacific region dealt with 3,269 security breaches caused by insider threats due to plain negligence.  

Read More

Delta, Sears Customer Data Breach Exposes Risks of Third Party Providers Once Again

Apr 26 by George V. Hulme

Once again, a third-party vendor may have exposed sensitive credit card information of hundreds of thousands of Delta Air Lines and Sears. The attack shows the vulnerability to reputation and risk from attacks on third party vendors.

Read More

Researchers Use Machine Learning, Cybersecurity Practices to Secure US Power Grid

Apr 25 by Luana Pascu

In 2015, Russian hackers shut down Ukraine’s electrical grid after infecting the infrastructure with malware. It was only a matter of time until they would target the US power system. As of 2016, US critical operational infrastructures have been under siege by "Russian government cyber actors," as described by the Department of Homeland Security and the FBI.

Read More

Is Cryptojacking Here to Stay?

Like most groundbreaking inventions, cryptocurrencies bring a moral paradox: while some people consider them a revolutionary tool to make the world a better place, others already use it to fuel their illegal activities. Therefore, it was just a matter of time before this energy-hungry activity became a serious cybersecurity issue.

Read More

Financial Services Remains Hackers’ Most-Targeted Industry for Second Straight Year

Apr 23 by Luana Pascu

The ease-of-exploit rating has made the financial sector a cybercrime magnet for years, especially for targeted extortion attacks. The industry has fallen victim to numerous security breaches, data exfiltration hacks, DDoS attacks taking down global online operations and disrupting services, and has lost millions to malware and ransomware attacks. So what’s next?

Read More

Machine Learning Is Also a Tool for Cybercriminals

Apr 20 by George V. Hulme

It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I know there’s a difference between machine language and AI, but so many use the terms interchangeably now that the difference is blurring in the minds of many.

Read More

Businesses Invest Heavily toward ‘Secure by Design’ GDPR Requirement

Apr 19 by Filip Truta

Less than two months before the European Union enforces its stringent General Data Protection Regulation (GDPR), businesses are rushing to achieve compliance, procedurally and technologically.

Read More

Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows

Apr 18 by Filip Truta

Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 67 organizations.

Read More

US, UK, and Australian governments accuse Russia of targeting networking infrastructure

Apr 17 by Graham Cluley

Government departments and private businesses are being targeted in internet attacks orchestrated by the Russian government, exploiting commercially available network infrastructure.

Read More

Your Protection Is Our Mission, and We’re Serious About It

Apr 17 by Bogdan Botezatu

In 2001, a team of 30 cyber security experts in Romania had a dream: to provide excellent protection in the rapidly growing, often dangerous new world of the internet. Today, more than 1,300 security experts on three continents work passionately to offer security solutions for more than 500 million users in 150 countries.

Read More

What Security Risks Should MSPs Expect in 2018

Apr 17 by Liviu Arsene

As IT operations are becoming more complex and require both advanced infrastructure and security expertise to increase the overall security posture of the organization, the managed service provider (MSP) industry is gaining more traction and popularity.

Read More

CISOs Who Deliver a Compelling Narrative Stand a Better Chance of Expanding Their IT Security Budgets

Apr 16 by Filip Truta

Chief Information Security Officers (CISOs) have historically chafed at budget constraints, with some pushing the envelope and bringing the case for stronger cyber defenses to the board room. New research indicates that executive decision-makers want InfoSec costs linked to business value and return on investment (ROI), and it’s CISOs who can deliver a compelling narrative to their peers that typically achieve this goal.

Read More

As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million

Apr 14 by Filip Truta

One of the hottest topics in the business world these days is the General Data Protection Regulation (GDPR), the European Union’s endeavor to create a unified framework that governs how data collectors and processors safeguard the privacy of their users and build walls that cybercriminals can’t penetrate.

Read More

Enterprise Networks Hit by Cryptominers; 2.5 Billion Attacks Blocked in Six Months

Apr 13 by Luana Pascu

Cryptomining transactions, seen as a terrific money-making scheme separate from the traditional online advertising, are growing faster than ever, concluded security researchers after 2.5 billion attacks were blocked in enterprise networks in the past six months.

Read More

Thinking of Moving ERP to the Cloud? Don’t Forget About Security

Apr 12 by Bogdan Botezatu

Enterprise resource planning (ERP) continues to be a mainstay of corporate IT, providing the backbone for a variety of business processes including finance, human resources, procurement, and services.

Read More

CISOs' Latest Struggle: When Prevention Is Faulty, but Investigation Is a Burden

Apr 11 by Razvan Muresan

In a fast-changing landscape where large cyberattacks make the news virtually every month, companies have started shifting their security defense paradigm towards gaining more visibility into the way attacks occur, and how they become targets

Read More

Seven Steps Toward Bridging the Cybersecurity Skills Gap

Apr 10 by Ericka Chickowski

Building an effective cybersecurity team is no mean feat. Hiring managers struggle to find experienced talent today and according to the most recent figures from ISACA, one in three organizations say it takes six months or longer to fill any given security position.

Read More

IoT Security Spending Due to Surge as Enterprises Address Big Gaps

Apr 05 by Ericka Chickowski

Cyber attacks, security incidents and breaches initiated through insecure Internet of Things (IoT) devices are on the uptick and most enterprises aren't yet on track to do anything about it, according to several high-profile studies over the last month.

Read More

GDPR & EDR: Protecting Personally Identifiable Information of EU Citizens

Apr 04 by Filip Truta

In 2017, Gartner found organizations were gravely underprepared for the European Union’s General Data Protection Regulation (GDPR). More than half of companies affected will not be in full compliance when the regulation takes effect in May 2018, the group said.

Read More

More than Half of CIOs Suspect Their Mobile Workers Have Been Hacked in the Past 12 Months

Apr 03 by Filip Truta

Mobility is central to today’s business environment, enabling workers to bring their own devices and connect from remote locations to the company network. However, this practice opens the door to hackers, and CIOs in the United States and Europe are well aware of this.

Read More

Costs of Non-Compliance are Getting Higher

Apr 02 by Razvan Muresan

For many companies, especially those in highly regulated industries such as financial services and healthcare, ensuring compliance with a growing number of government and industry regulations can be a nuisance and a drain on already strained resources.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets