The ease-of-exploit rating has made the financial sector a cybercrime magnet for years, especially for targeted extortion attacks. The industry has fallen victim to numerous security breaches, data exfiltration hacks, DDoS attacks taking down global online operations and disrupting services, and has lost millions to malware and ransomware attacks. So what’s next?
All about Virtualization and Cloud Security | Recent Articles:
Financial Services Remains Hackers’ Most-Targeted Industry for Second Straight Year
It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I know there’s a difference between machine language and AI, but so many use the terms interchangeably now that the difference is blurring in the minds of many.
Less than two months before the European Union enforces its stringent General Data Protection Regulation (GDPR), businesses are rushing to achieve compliance, procedurally and technologically.
Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows
Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 67 organizations.
US, UK, and Australian governments accuse Russia of targeting networking infrastructure
Government departments and private businesses are being targeted in internet attacks orchestrated by the Russian government, exploiting commercially available network infrastructure.
In 2001, a team of 30 cyber security experts in Romania had a dream: to provide excellent protection in the rapidly growing, often dangerous new world of the internet. Today, more than 1,300 security experts on three continents work passionately to offer security solutions for more than 500 million users in 150 countries.
As IT operations are becoming more complex and require both advanced infrastructure and security expertise to increase the overall security posture of the organization, the managed service provider (MSP) industry is gaining more traction and popularity.
CISOs Who Deliver a Compelling Narrative Stand a Better Chance of Expanding Their IT Security Budgets
Chief Information Security Officers (CISOs) have historically chafed at budget constraints, with some pushing the envelope and bringing the case for stronger cyber defenses to the board room. New research indicates that executive decision-makers want InfoSec costs linked to business value and return on investment (ROI), and it’s CISOs who can deliver a compelling narrative to their peers that typically achieve this goal.
One of the hottest topics in the business world these days is the General Data Protection Regulation (GDPR), the European Union’s endeavor to create a unified framework that governs how data collectors and processors safeguard the privacy of their users and build walls that cybercriminals can’t penetrate.
Enterprise Networks Hit by Cryptominers; 2.5 Billion Attacks Blocked in Six Months
Cryptomining transactions, seen as a terrific money-making scheme separate from the traditional online advertising, are growing faster than ever, concluded security researchers after 2.5 billion attacks were blocked in enterprise networks in the past six months.
Enterprise resource planning (ERP) continues to be a mainstay of corporate IT, providing the backbone for a variety of business processes including finance, human resources, procurement, and services.
CISOs' Latest Struggle: When Prevention Is Faulty, but Investigation Is a Burden
In a fast-changing landscape where large cyberattacks make the news virtually every month, companies have started shifting their security defense paradigm towards gaining more visibility into the way attacks occur, and how they become targets
Building an effective cybersecurity team is no mean feat. Hiring managers struggle to find experienced talent today and according to the most recent figures from ISACA, one in three organizations say it takes six months or longer to fill any given security position.
Cyber attacks, security incidents and breaches initiated through insecure Internet of Things (IoT) devices are on the uptick and most enterprises aren't yet on track to do anything about it, according to several high-profile studies over the last month.
In 2017, Gartner found organizations were gravely underprepared for the European Union’s General Data Protection Regulation (GDPR). More than half of companies affected will not be in full compliance when the regulation takes effect in May 2018, the group said.
More than Half of CIOs Suspect Their Mobile Workers Have Been Hacked in the Past 12 Months
Mobility is central to today’s business environment, enabling workers to bring their own devices and connect from remote locations to the company network. However, this practice opens the door to hackers, and CIOs in the United States and Europe are well aware of this.
For many companies, especially those in highly regulated industries such as financial services and healthcare, ensuring compliance with a growing number of government and industry regulations can be a nuisance and a drain on already strained resources.
Cloud Security
Virtualization Security
Subscribe to Blog Updates
Posts by Categories
- breach (2)
- BYOD (28)
- CIO (7)
- CISO (7)
- Cloud Security (114)
- connected care (1)
- credit card (3)
- cryptocurrency (3)
- cryptojacking (1)
- cryptomining (1)
- Cyber Security Awareness Month (5)
- cyber-attack (2)
- cybersecurity awareness (8)
- data breach (18)
- Data Protection (75)
- data protection act (2)
- datacenter (2)
- DevOps (9)
- Endpoint Protection & Management (14)
- Enterprise Security (399)
- Equifax (2)
- financial services (8)
- garter (1)
- GDPR (14)
- GDPR, Data Protection (2)
- General Data Protection Regulation (3)
- GiTEX (1)
- Healthcare (2)
- hyperconverged infrastructure (1)
- hypervisor (14)
- hypervisor introspection (10)
- identity theft (2)
- Industries (31)
- insider threats (3)
- Integration (2)
- IoT (3)
- IoT, Policy, security (6)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (4)
- malware, threats (5)
- memory introspection (12)
- Microsoft (1)
- Network Protection (9)
- ransomware (3)
- ransomware, HVI (3)
- report (1)
- Security as a Service (15)
- Security Threats (54)
- SMB Security (39)
- Software-defined-datacenter (4)
- Virtualization & Data Center Security (69)
- WDATP (1)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2018 (17)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)