It has long been accepted as truth that staff, an organization’s first and last line of defense, is the vulnerability that malicious actors most take advantage of to steal data or deploy malware. But newer studies show an increase in malicious insiders, and one survey indicates that most IT security leaders believe this to be the case in their organization.
All about Virtualization and Cloud Security | Recent Articles:
Paranoid or Rightfully Concerned? 61% of CISOs Think Staff Leak Data Intentionally
Speed Up Incident Investigation and Resolution with Network Traffic Analytics
The effectiveness of security incident investigation and resolution is key to the effectiveness of all defense efforts. But improving incident investigation and resolution does not come without challenges: Too many alerts to handle and poor correlation between alerts.
Identity and Access Management on the Rise as Environments Grow in Complexity
One of the biggest concerns and challenges in cyber security is knowing who has access to which data and applications within an enterprise at any given time. This has become all the more complex for IT and security management with the growth in cloud services and the increased use of mobile devices, which create many more points of access within organizations.
Countering internal threats remains one of the biggest challenges for businesses, with a rise in phishing and ransomware attacks, as well as negligent and malicious insiders, new research shows.
With Nine Months to Go, Only 14 Percent of Companies Are Ready for California’s New Privacy Law
Companies with customers or employees in California have only 10 months to become compliant with the toughest privacy law so far in the United States. But only a small percentage of such organizations are ready for the upcoming legislation.
How AV and Endpoint Security Are Failing MSPs in Defending against Attacks
Recent attacks on MSPs have confirmed once again that both managed service providers and customers are increasingly targeted by cybercriminals, and the attacks often succeed.
In about two months, two years will have passed since the WannaCry ransomware attack, a large-scale, global security incident that spread through the EternalBlue exploit targeting computers operating on outdated Windows systems. It affected over 300,000 computers that were still using vulnerable software such as Windows Vista and Windows 7, which had already been obsolete for quite a while.
Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security
The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security challenge for many organizations, vastly expanding the potential attack surface because of the greatly increased number of end point devices in use.
Cyber security breaches can come from a wide variety of sources: Hackers out to exploit vulnerabilities and make money or wreak havoc; nation states looking to gain an economic advantage; competitors aiming to steal intellectual property; and disgruntled employees plotting to cause damage at their companies—to name a few.
Verizon Study Shows Mobile Devices among Top Entry Points for Hackers, Ransomware Remains Most Successful Attack
The Facebook data breach of 2018, probably the biggest of the year, illustrates better than any other example that no company, big or small, is immune to hackers. One would expect a company of Facebook’s size to sustain top-tier research and development for cybersecurity, but last year’s breaches prove it’s vulnerable anyway.
Since the rise of eCommerce in the late 1990s, enterprises have sought ways to improve the security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit.
Recently the ISACA (Information Systems Audit and Control Association) and the Digital Manufacturing and Design Innovation Institute (DMDII) together conducted a survey that aimed to pinpoint the current cybersecurity challenges faced by the manufacturing industry. According to the ISACA and the DMDII, the survey highlighted how manufacturers face real security concerns when it comes to finding adequate cybersecurity workers, funding the right level of cybersecurity budget, and securing the internet of things (IoT)-integrated devices.
Financial damage associated with cybercrime and insider threats jumped 12% globally in 2018 and accounted for a third of all cybersecurity costs, new research shows.
Phishing remained a preferred attack vector in 2018, with hackers ramping up their efforts by 250% between January and December. Phishing attack methods have also evolved in recent times, as bad actors are forced to bypass increasingly efficient anti-phishing tools and techniques.
FBI Boss Warns Businesses of Chinese Hackers Stealing Their Intellectual Property
What's the biggest cybersecurity threat for US businesses?
New Bitdefender decryptor can be deployed across the network to automate recovery
Data Breach Disclosures by UK Banks Jump 480% in 2018, Financial Regulator Says
In 2018, companies struggled to mitigate large-scale attacks and data breaches, but apparently too little action has been taken to improve defenses in 2019. Businesses are trying to be proactive. They have increased cybersecurity budgets and invested in resources, including in qualified IT staff. So why are they, financial services specifically, still falling for social engineering scams and malware attacks? What hampers efforts to safeguard their networks?
Embracing Heterogeneity
To say that modern-day IT infrastructure is diverse is an understatement. Today’s enterprise datacenter is a hodgepodge of legacy systems, software-defined on-premises infrastructure and a mix of clouds. In fact, organizations have an average of 4.8 clouds each, according to the RightScale® 2018 State of the Cloud Report. And according to Forrester¹, 36% of businesses use 6 clouds or more!
The healthcare industry has been a major target for bad actors in recent years, who have inflicted heavy financial losses, reputational damage and risking patient health. Administrators have responded by bolstering cybersecurity budgets, security solution deployments, and awareness training. But much more needs to be done to stay on top of this constant threat, experts believe.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)