After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and strengthen national infrastructure and consumer security, officials plan to issue an impressive challenge to enterprises across the UK.
All about Virtualization and Cloud Security | Recent Articles:
2018 was a busy year for the cybersecurity sector, as independent cyber-criminals and state-sponsored actors alike further advanced their motives and tactics. Legislators in turn have flipped on the GDPR switch to punish organizations with lax security practices, and many still have a ways to go to achieve compliance.
We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications?
Government CIOs to Focus Technology Investments on Data Analytics and Cybersecurity in 2019, Gartner Says
Chief Information Officers in government are recognizing the importance of investing in game-changing technologies, including artificial intelligence, machine learning, analytics and blockchain. Spending on cybersecurity is projected to continue to rise as the government recognizes its role as the steward of public data, according to Gartner.
Business Payroll Compromise – a New Way for Criminals to Steal from Your Company
Firms are being warned about a threat which evolves traditional business email compromise scams into a whole new way of extracting money from unwary companies.
Cybercrime to Cost $5.2 Trillion over Next 5 Years; High-Tech Industry Most at Risk
Businesses are struggling to develop cyber resilience to fend off attacks as they seek to create flawless operations and to scale systems. Efficient cybersecurity in an advancing digital economy is no easy goal, as many factors are at play, including third-party risks and increased attack surface, as a result of extensive interest in IoT deployments. This is why corporates and governments need to work together to set up priorities to help enable digital transformation and build trust through proper safeguards on consumer data privacy.
In the modern enterprise, APIs are both the keys that unlockdata and the glue that makes system integration possible. But how steep are the associated security concerns APIs create?
Most IT decision makers agree cybersecurity is the nut to crack in 2019 and beyond, but IT departments are surprisingly permissive with risky internal practices like shadow IT.
2020 will bring the end of Windows 7, following Microsoft’s announcement that it will no longer offer support and updates for the operating system starting January 14, 2020. But companies appear to have had a good run with it and are not yet ready to say goodbye, a Kollective survey of 1,000 US and UK enterprise IT professionals has found.
The cost of attack mitigation is ascending, and so it the number of organizations under attack. Between 2018 and 2019, most organizations have experienced some type of attack, and only 7% have experienced no attack at all, according to new research.
Security is a Critical Factor in Determining where Enterprises Will Run Their Application
Some 71% of CISOs rank data security and compliance as the most important factor when choosing where to put their application workloads, according to a recent survey by Nutanix.
Does your business include cyber and privacy management in digital transformation "fully from the start"? Are you comfortable with your reporting on metrics for cyber and privacy risk management? These are among the key questions consulting firm PwC wants businesses to answer in 2019.
Container Security Incidents to Rise in 2019 as Companies Knowingly Deploy Vulnerable Containers
The popularity of container technology has grown fast in software engineering, but 60 percent of organizations suffered at least one container-related security incident in 2018, mostly caused by the advancement of DevOps teams, according to Tripwire’s State of Container Security Report. 71 percent anticipate an increase in container security incidents in 2019, most likely raising the costs of hybrid cloud security.
Building a hybrid cloud environment can provide a host of benefits for organizations, including a level of flexibility and agility not possible with a traditional on-premise data center infrastructure. But it can also create complexities that can lead to increased risk for enterprises.
“Make No Mistake, American Companies Are Squarely in the Cross-Hairs of Well-Financed Nation-State Actors,” U.S. Counter-Spy Center Says
To enhance private sector awareness, the U.S. government is highlighting the biggest threats faced by American companies from enemy states.
Privileged accounts are those accounts you most definitely never want to lose control over. These accounts include what used to be commonly called “superuser” accounts, those accounts that provide the highest level of access to a system, such as a server, local endpoints, and others. You can consider privileged accounts to be like administrative accounts that provide a higher level of access, typically to configure, manage and otherwise support a system. These types of accounts are often unrestricted, or lightly restricted.
Few industries today are faced with as many cyber security threats as the healthcare sector. Patient data is among the most sensitive information in the digital ecosystem, and cyber criminals are often looking to leverage these resources for profit.
Moving into 2019, HHS Urges Healthcare Practitioners and Executives to Bolster Defenses Against Cybercrime
Amid growing fears about cybercrime in healthcare, the US Department of Health and Human Services (HHS) has released guidelines to healthcare organizations of all types and sizes, ranging from local clinics to large hospital systems.
Strengthening its cybersecurity measures against China and other potential state-sponsored threats, Japan is on track to impose domestic storage of electronic data generated by critical infrastructures like power and water suppliers.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (6)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)