Despite spending billions on preventing data loss, the C-suite is demonstrating a stark disconnect between business policy and personal behavior. Many admit to stealing intellectual property (IP) from a former employer, while others are taking hacker attacks as such a certainty that they are literally stockpiling crypto-cash to pay off hackers in the event of a breach.
All about Virtualization and Cloud Security | Recent Articles:
Data breaches have become the new norm, presenting a major security concern for organizations, as both customer personal data and a company’s intellectual property have become high value targets for cybercriminals.
The Federal Trade Commission (FTC) wants increased power and regulatory authority, including the ability to enforce civil penalties, when it comes to data security.
Enterprises and Governments Trust Hacker-Powered Security to Identify Unique Critical Vulnerabilities
Data breaches not only cost companies millions, but they also inflict reputational damage, customer turnover and operational costs. The average cost of a data breach has risen 6.4% to a global average of $3.86 million this year, according to research from the Ponemon Institute.
The rising tide of criminal schemes to steal compute cycles for mining cryptocurrency has reached a high-water mark. This month researchers report that cryptojacking malware and attacks have overtaken ransomware as the number one malware threat online today.
UK Enterprises Concerned Voice-Activated Devices Could Easily Leak Data, Affecting GDPR Compliance
With speech recognition and voice-activated personal assistants slowly making their move into the corporate world, companies will have to adjust their security and digital strategies, infrastructure and customer interactions.
More Organizations Are Adopting Biometrics for Security—But Barriers Still Remain
For years, biometrics technology has been discussed as a possible solution for more effectively controlling access to systems and networks. But the technology has often been deemed to be too expensive for many organizations and too invasive for end users—and as a result adoption has been slower than some might have thought.
Enterprises are progressively moving their workloads to multiple cloud (multi-cloud) providers, migrating their mission-critical applications to an environment that facilitates performance, management and scalability. This novel strategy shifts focus away from cutting costs and towards increased performance and security, while enabling organizations to stay innovative and competitive, new data shows.
A recent report from P&S Market Research pegs the growth in the cybersecurity artificial intelligence market at 36 percent annually from 2017 through 2023, when it expects the cybersecurity artificial intelligence market to reach $18 billion.
Businesses Seek to Please Customers Before Regulators in Drive for GDPR Compliance
2018 will be remembered by many in the corporate world as the year the GDPR kicked in. Every organization covered by the EU’s new regulation had a year’s heads up to ensure conformity, yet few today are 100% compliant. However, new data suggests a few good reasons behind businesses’ extra diligence in their approach to this pressing issue.
The FBI is once again warning businesses of the serious dangers posed by business email compromise (BEC) scams, saying that losses globally have risen by 136% since December 2016.
The past few years have seen IT chiefs take on more and more duties towards achieving cyber resilience for their organizations. Little do their higher-ups know that different ranks across the company must now shoulder those responsibilities to accomplish this mission. And if recent studies are any indication, CIOs and CISOs still have a ways to go to persuade their peers to make cybersecurity a key part of the business program.
Building a DevSecOps Culture
Talk to any enterprise that has embraced DevOps and are trying to ensure security is adequately integrated into the organization and they'll likely say the challenge is twofold: tools and culture. Moreover, the most difficult of those two is culture.
Five Reasons Enterprises Aren't Getting the Most Out of Security Automation
Automation is enterprise cybersecurity's biggest buzzword as organizations seek to keep pace with a threat landscape that grows more frenetic by the hour. But as automation spending skyrockets, many enterprises are finding that they're not getting the most out of their investment.
While we’ve just passed the halfway mark of 2018, data breaches and new threats have been plaguing businesses and organizations, exposing the data of millions of users worldwide. Apart from known and increasingly sophisticated threats, such as ransomware, the hype around cryptocurrency has led to the emergence of cryptojackers, a new problem organizations need to deal with.
CIO Roles Grow More Strategic As Cloud Migration and Data Security Become Industry Standards
The topic of cybersecurity is rapidly moving up the agenda of CIOs.
Cyber security and regulatory compliance are becoming increasingly intertwined, which is forcing organizations to rethink how they manage corporate risk.
It’s common knowledge that cyberattacks will escalate, so upper management has to develop an understanding of the threat landscape, the different types of attacks and what it all involves. Right now, the Trump administration is working on an executive order to clearly establish the duties of agency chief information officers.
Serverless computing is taking off. By some estimates, many enterprises that are using public cloud have embraced serverless computing. As TheNewStack’s Lawrence Hecht wrote, “After digging in, we found that the survey says 70 percent of enterprises have migrated a significant number of workloads to the public cloud. Among this group, 39 percent of using serverless, 40 percent are using containers and 34 percent are using container orchestration.”
Research giant Gartner is out with a report documenting six emerging trends that IT security leaders should keep on their radar in 2018 and beyond. The findings could easily serve as pro tips for security leaders looking to gain a foothold in their organization’s decision-making process.
The FBI’s Internet Crime Complaint Center (IC3) has released its latest Internet Crime Report highlighting the most common attack avenues for bad actors, as well as some important statistics to keep in mind in 2018 and beyond.
CISOs Place Improved Threat Detection while Boosting Performance as Top Benefits of Security Suites
As 250,000 new malicious programs and an increasing number of tailor-made threats try to wreak havoc on corporate IT infrastructures each day, CISOs face a seemingly impossible challenge: to add better protection while remaining fast and flexible in tackling modern threats.
The time for the healthcare industry to embrace cloud computing has been long. But it’s finally here, according to a recent survey conducted around HIMSS18 (Healthcare Information and Management Systems Society) of Members of the College of Healthcare Information Management Executives.
Mere months after the NotPetya ransomware contagion, victims were already reporting more than $1 billion in damages across countries and verticals. And the costs associated with the attack are apparently still climbing.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)