If you’re running a company you might like to imagine that all of your staff are happy in their positions, feeling fulfilled by the career opportunities that you have provided to them, and content imagining a future where they will always be working for your firm.
All about Virtualization and Cloud Security | Recent Articles:
There’s no shortage of research in the cybersecurity sector. Players in this vertical relentlessly keep tabs on the trends, both positive and negative, to better understand cybercriminals’ mindset and deploy adequate defenses. One recent study reveals that businesses in all industries most fear their staff – both the negligent worker and the potentially nefarious employee.
Businesses Increasingly Expose Sensitive Data via Cloud Applications and Services
Despite ever-stricter regulations, businesses across the world are increasingly exposing company data by irresponsibly using unsecured public cloud services and applications, new research shows.
How to Improve Threat Visibility and Reduce Time to Detection with Network Traffic Analytics (NTA)
Network Traffic Analytics is a new category of security solution designed to improve visibility into threat-related activity and reduce the dwell time of advanced attacks.
Despite knowing better, many organizations cave into attackers’ demands, paying ransomware operators whatever they ask for in exchange for the decryption keys to their locked data.
Downtime Can Cost a Company up to $67 Million Over Two Years, Threatening Brand Reputation
A cyber-incident inflicts damage beyond just downtime and recovery costs. A breach can spell disaster for a company’s image, leading to devaluation, lost business, high turnover, and even bankruptcy in extreme cases. However, a breach isn’t the only cyber-threat lurking in the business sector.
Earlier this year, Quantum computing took another big step out of the laboratory and toward commercial viability with the release of the IBM Q System One. Last year Google announced its ‘Bristlecone’ Quantum Computing Chip.
Only three months short of its first year anniversary on May 28, it’s time to take a look at EU’s GDPR by numbers. Enforced to protect European users from unethical and illegal commercial practices, the internet privacy law has so far led to three major fines for privacy infringement.
Fear of Data Breaches Driving Big Businesses to Raise Spending on IT in 2019, Survey Shows
54 percent of companies will increase IT security spending in 2019, and almost a third will do so by 10 to 20 percent or more, according to a study by eSecurity Planet. The reason? Fear of data breaches and the penalties under new privacy regulations like Europe’s GDPR.
Bank of Valletta Shuts Down Operations after Hackers Attempt 13 Million EUR Transfer Overseas
Financial services organizations operate with high volumes of valuable data, making them an attractive target for hackers. They are vulnerable to scams, fraud and banking Trojans, so data security in this sector is critical. IT executives struggle to optimize cybersecurity, as they often deal with low budgets and a lack of skilled workers to implement better security. These are top roadblocks, especially as open banking exposes their data and infrastructure to third-party vulnerabilities.
Healthcare's Cybersecurity Radiography: Only One in Six Organizations Can Detect Advanced Threats
The healthcare sector has to store increasing quantities of personally identifiable and sensitive information, making it one of the most attractive targets for data theft. However, according to EY’s Global Information Security Survey 2018-2019, the sector’s awareness of cyber risks is growing, and many organizations are determined to put stronger protections in place.
Australian Government Worries Businesses Don’t Focus Enough on Securing Commercial Secrets
Not taking security strategy and execution seriously enough to come up with a proper incident response program is a problem that is regularly noticed. Businesses large and small fear customer information, financial data or corporate secrets will fall to the wrong hands in an advanced malware attack. But they keep investing in the wrong projects, work with outdated software, don’t train employees about passwords and phishing to prevent human error and internal attacks, and don’t look into third-party vulnerability protection.
Hackers are hitting European businesses with an increasing number of attacks meant to disrupt their operations, according to new data from DDoS protection experts. Both the volume and the complexity of the attacks is growing, and over half used multiple attack vectors.
The Short (and Longer) Term Remaining Damage of the Government Closure on Cybersecurity
While the U.S. Federal government is running (for now) again, there remains a concern that the partial shutdown will have a long-term impact on the cybersecurity readiness of the nation.
40% of Organizations Will Adopt Biometric SaaS Authentication by 2022, Gartner Predicts
The ‘bring-your-own-device to work’ trend has made traditional security methods appear obsolete. It seems the good old-fashioned password authentication or code received via text on a smartphone can’t cut it anymore. Multi-factor authentication and biometric security appear to be the answer for now for both organizations and consumers.
Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications.
Big cyber attacks like the Equifax incident in 2017 and the Marriot breach in 2018 have had devastating effects for those in the hackers’ crosshairs. But high-profile data breaches also hold important value for the good guys: clues to the attackers’ mindset.
We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications?
Phishing remains the attack vector of choice for cybercriminals, with 23,000 incidents per organization annually, according to a new survey. Organizations spend on average $4.3 million per year to investigate phishing incidents.
The promise was that cloud computing would simplify enterprise business-technology. Enterprise users would be able to focus on their applications and services while leaving the deeper security issues associated with infrastructure and secure delivery and management of applications to the cloud provider. It didn’t exactly turn out that way.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)