If you’re running a company you might like to imagine that all of your staff are happy in their positions, feeling fulfilled by the career opportunities that you have provided to them, and content imagining a future where they will always be working for your firm.
All about Virtualization and Cloud Security | Recent Articles:
There’s no shortage of research in the cybersecurity sector. Players in this vertical relentlessly keep tabs on the trends, both positive and negative, to better understand cybercriminals’ mindset and deploy adequate defenses. One recent study reveals that businesses in all industries most fear their staff – both the negligent worker and the potentially nefarious employee.
Despite ever-stricter regulations, businesses across the world are increasingly exposing company data by irresponsibly using unsecured public cloud services and applications, new research shows.
Network Traffic Analytics is a new category of security solution designed to improve visibility into threat-related activity and reduce the dwell time of advanced attacks.
Despite knowing better, many organizations cave into attackers’ demands, paying ransomware operators whatever they ask for in exchange for the decryption keys to their locked data.
A cyber-incident inflicts damage beyond just downtime and recovery costs. A breach can spell disaster for a company’s image, leading to devaluation, lost business, high turnover, and even bankruptcy in extreme cases. However, a breach isn’t the only cyber-threat lurking in the business sector.
Earlier this year, Quantum computing took another big step out of the laboratory and toward commercial viability with the release of the IBM Q System One. Last year Google announced its ‘Bristlecone’ Quantum Computing Chip.
Only three months short of its first year anniversary on May 28, it’s time to take a look at EU’s GDPR by numbers. Enforced to protect European users from unethical and illegal commercial practices, the internet privacy law has so far led to three major fines for privacy infringement.
54 percent of companies will increase IT security spending in 2019, and almost a third will do so by 10 to 20 percent or more, according to a study by eSecurity Planet. The reason? Fear of data breaches and the penalties under new privacy regulations like Europe’s GDPR.
Financial services organizations operate with high volumes of valuable data, making them an attractive target for hackers. They are vulnerable to scams, fraud and banking Trojans, so data security in this sector is critical. IT executives struggle to optimize cybersecurity, as they often deal with low budgets and a lack of skilled workers to implement better security. These are top roadblocks, especially as open banking exposes their data and infrastructure to third-party vulnerabilities.
The healthcare sector has to store increasing quantities of personally identifiable and sensitive information, making it one of the most attractive targets for data theft. However, according to EY’s Global Information Security Survey 2018-2019, the sector’s awareness of cyber risks is growing, and many organizations are determined to put stronger protections in place.
Not taking security strategy and execution seriously enough to come up with a proper incident response program is a problem that is regularly noticed. Businesses large and small fear customer information, financial data or corporate secrets will fall to the wrong hands in an advanced malware attack. But they keep investing in the wrong projects, work with outdated software, don’t train employees about passwords and phishing to prevent human error and internal attacks, and don’t look into third-party vulnerability protection.
Hackers are hitting European businesses with an increasing number of attacks meant to disrupt their operations, according to new data from DDoS protection experts. Both the volume and the complexity of the attacks is growing, and over half used multiple attack vectors.
While the U.S. Federal government is running (for now) again, there remains a concern that the partial shutdown will have a long-term impact on the cybersecurity readiness of the nation.
The ‘bring-your-own-device to work’ trend has made traditional security methods appear obsolete. It seems the good old-fashioned password authentication or code received via text on a smartphone can’t cut it anymore. Multi-factor authentication and biometric security appear to be the answer for now for both organizations and consumers.
Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications.
Big cyber attacks like the Equifax incident in 2017 and the Marriot breach in 2018 have had devastating effects for those in the hackers’ crosshairs. But high-profile data breaches also hold important value for the good guys: clues to the attackers’ mindset.
We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications?
Phishing remains the attack vector of choice for cybercriminals, with 23,000 incidents per organization annually, according to a new survey. Organizations spend on average $4.3 million per year to investigate phishing incidents.
The promise was that cloud computing would simplify enterprise business-technology. Enterprise users would be able to focus on their applications and services while leaving the deeper security issues associated with infrastructure and secure delivery and management of applications to the cloud provider. It didn’t exactly turn out that way.