Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Paranoid or Rightfully Concerned? 61% of CISOs Think Staff Leak Data Intentionally

Mar 29 by Filip Truta

It has long been accepted as truth that staff, an organization’s first and last line of defense, is the vulnerability that malicious actors most take advantage of to steal data or deploy malware. But newer studies show an increase in malicious insiders, and one survey indicates that most IT security leaders believe this to be the case in their organization.

Read More

Speed Up Incident Investigation and Resolution with Network Traffic Analytics

Mar 28 by Bogdan Carlescu

The effectiveness of security incident investigation and resolution is key to the effectiveness of all defense efforts. But improving incident investigation and resolution does not come without challenges: Too many alerts to handle and poor correlation between alerts.

Read More

Identity and Access Management on the Rise as Environments Grow in Complexity

Mar 27 by Razvan Muresan

One of the biggest concerns and challenges in cyber security is knowing who has access to which data and applications within an enterprise at any given time. This has become all the more complex for IT and security management with the growth in cloud services and the increased use of mobile devices, which create many more points of access within organizations.

Read More

Cyber Criminals Increasingly Attack the Human Layer When Targeting Businesses

Mar 25 by Filip Truta

Countering internal threats remains one of the biggest challenges for businesses, with a rise in phishing and ransomware attacks, as well as negligent and malicious insiders, new research shows.

Read More

With Nine Months to Go, Only 14 Percent of Companies Are Ready for California’s New Privacy Law

Mar 21 by Filip Truta

Companies with customers or employees in California have only 10 months to become compliant with the toughest privacy law so far in the United States. But only a small percentage of such organizations are ready for the upcoming legislation.

Read More

How AV and Endpoint Security Are Failing MSPs in Defending against Attacks

Mar 20 by Cristian Iordache

Recent attacks on MSPs have confirmed once again that both managed service providers and customers are increasingly targeted by cybercriminals, and the attacks often succeed.

Read More

EU Ready to Take On Cross-Border Attack with New Europol Protocol

Mar 20 by Luana Pascu

In about two months, two years will have passed since the WannaCry ransomware attack, a large-scale, global security incident that spread through the EternalBlue exploit targeting computers operating on outdated Windows systems. It affected over 300,000 computers that were still using vulnerable software such as Windows Vista and Windows 7, which had already been obsolete for quite a while.

Read More

Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security

Mar 18 by Razvan Muresan

The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security challenge for many organizations, vastly expanding the potential attack surface because of the greatly increased number of end point devices in use.

Read More

Addressing the Human Error Causes of Security Breaches

Mar 15 by Razvan Muresan

Cyber security breaches can come from a wide variety of sources: Hackers out to exploit vulnerabilities and make money or wreak havoc; nation states looking to gain an economic advantage; competitors aiming to steal intellectual property; and disgruntled employees plotting to cause damage at their companies—to name a few.

Read More

Verizon Study Shows Mobile Devices among Top Entry Points for Hackers, Ransomware Remains Most Successful Attack

Mar 14 by Luana Pascu

The Facebook data breach of 2018, probably the biggest of the year, illustrates better than any other example that no company, big or small, is immune to hackers. One would expect a company of Facebook’s size to sustain top-tier research and development for cybersecurity, but last year’s breaches prove it’s vulnerable anyway.

Read More

The Long Road Toward Building Secure Software at Enterprise Scale

Mar 13 by George V. Hulme

Since the rise of eCommerce in the late 1990s, enterprises have sought ways to improve the security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit.

Read More

It’s Time Manufacturers Assemble a Sound Cybersecurity Effort

Mar 12 by George V. Hulme

Recently the ISACA (Information Systems Audit and Control Association) and the Digital Manufacturing and Design Innovation Institute (DMDII) together conducted a survey that aimed to pinpoint the current cybersecurity challenges faced by the manufacturing industry. According to the ISACA and the DMDII, the survey highlighted how manufacturers face real security concerns when it comes to finding adequate cybersecurity workers, funding the right level of cybersecurity budget, and securing the internet of things (IoT)-integrated devices.

Read More

Cybercrime Costs Climb 12% to $13 Million per Company in 2018

Mar 11 by Filip Truta

Financial damage associated with cybercrime and insider threats jumped 12% globally in 2018 and accounted for a third of all cybersecurity costs, new research shows.

Read More

Microsoft: Phishing Attacks Increased 250% from January to December 2018

Mar 08 by Filip Truta

Phishing remained a preferred attack vector in 2018, with hackers ramping up their efforts by 250% between January and December. Phishing attack methods have also evolved in recent times, as bad actors are forced to bypass increasingly efficient anti-phishing tools and techniques.

Read More

FBI Boss Warns Businesses of Chinese Hackers Stealing Their Intellectual Property

Mar 07 by Graham Cluley

What's the biggest cybersecurity threat for US businesses?

Read More

Thwarting GandCrab in the New Era of Agile Computer-Jackers

Mar 06 by Bogdan Botezatu

New Bitdefender decryptor can be deployed across the network to automate recovery

Read More

Data Breach Disclosures by UK Banks Jump 480% in 2018, Financial Regulator Says

Mar 05 by Luana Pascu

In 2018, companies struggled to mitigate large-scale attacks and data breaches, but apparently too little action has been taken to improve defenses in 2019. Businesses are trying to be proactive. They have increased cybersecurity budgets and invested in resources, including in qualified IT staff. So why are they, financial services specifically, still falling for social engineering scams and malware attacks? What hampers efforts to safeguard their networks?

Read More

Embracing Heterogeneity

Mar 04 by Michael Weinstein

To say that modern-day IT infrastructure is diverse is an understatement. Today’s enterprise datacenter is a hodgepodge of legacy systems, software-defined on-premises infrastructure and a mix of clouds. In fact, organizations have an average of 4.8 clouds each, according to the RightScale® 2018 State of the Cloud Report. And according to Forrester¹, 36% of businesses use 6 clouds or more!

Read More

Most Cybersecurity Incidents in Healthcare Sector Start with Email

Mar 01 by Filip Truta

The healthcare industry has been a major target for bad actors in recent years, who have inflicted heavy financial losses, reputational damage and risking patient health. Administrators have responded by bolstering cybersecurity budgets, security solution deployments, and awareness training. But much more needs to be done to stay on top of this constant threat, experts believe.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets