Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

It’s 2019 and Most CISOs at Financial Institutions Demand Bigger Cybersecurity Budgets

May 30 by Filip Truta

Almost a quarter of Chief Information Security Officers (CISOs) in the finance sector have drawn up plans to compel their Chief Financial Officer (CFO) to spend extra dollars on their organization’s cybersecurity posture, according to a new study.

Read More

EternalBlue Worm Still Claiming Victims Two Years after WannaCry and NotPetya

May 29 by Filip Truta

The government of the US city of Baltimore is seeking federal dollars to recover from a devastating ransomware attack that allegedly leveraged the NSA-developed EternalBlue exploit. 

Read More

6% of Professionals Feel Personal Data Is Actually Less Protected under GDPR

May 28 by Filip Truta

One year in, there are still conflicting sentiments from the global workforce regarding the EU General Data Protection Regulation – specifically, whether the regulation has been effective.

Read More

Cyber Attacks Remain a High Risk, and More Enterprises are Buying Insurance for Protection

May 24 by Razvan Muresan

The Society of Actuaries (SOA), the world's largest actuarial professional organization, recently released its annual survey of emerging risks in conjunction with other partner organizations. The good news for security programs is that cyber risk for the first time in five years was not ranked at the top of the list. The bad news is that cyber security is still a formidable challenge for organizations.

Read More

Threat Intelligence – Know Thy Adversary

May 23 by George V. Hulme

Threat intelligence enables enterprises to better understand, detect and respond to threats. To mount a successful defense, enterprises need to know their enemies and anticipate their next move. So far, the defenders have been losing.

Read More

Google Stored Business Customers’ Passwords in Plaintext on Its Servers… For 14 Years

May 22 by Graham Cluley

Google has admitted that some of its business customers of G Suite (formerly known as Google Apps) had their passwords stored on the company’s internal servers for 14 years in plaintext.

Read More

Phishing Attacks against SaaS, Webmail Services Rise Sharply in Q1

May 20 by Luana Pascu

Believing that security incidents are imminent and probably unavoidable, enterprises are turning to advanced digital forensics to better understand and identify bad actors, and are open to using deception through technology such as honey pots or seeding fake data to help hunt down cybercriminals later, according to Neustar research. They’re also open to using deceptive tactics, such as deploying honey pots or seeding fake data to help hunt down cybercriminals later.

Read More

Bitdefender at Citrix Synergy – Security Done Right

At Bitdefender, we understand the security challenges that organizations face in this ever-accelerating, hybrid, multi-cloud world. From small to very large, companies encounter common issues. We have been collaborating with Citrix to anticipate and address your cloud workload-protection challenges.

Read More

Don’t Let Your Security Operations Team Suffer Alert Fatigue! 

May 16 by Bogdan Carlescu

Bitdefender IntelliTriage, the new Network Traffic Security Analytics (NTSA) module, enables security operations to: 

  • Reduce security incident investigation and response time 
  • Focus efforts only on threats that represent a risk to the organization 
  • Lower the skill and resource requirements for threat hunting 
Read More

FBI Detects New Surveillance Malware Linked to North Korea’s Lazarus Group

May 14 by Luana Pascu

Critical networks are caught in the crossfire of the battle over industrial secrets, tech patents, military operations and financial information. A month after the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint security advisory warning that a critical backdoor Trojan was in the wild, comes a new alert.

Read More

GandCrab Claims Supremacy: Most Prevalent Ransomware in the World Reaches 50% Market Share

May 13 by Filip Truta

Ransomware drains billions from the global economy each year and shows no signs of slowing down. However, the highest cost of a ransomware attack is no longer the ransom itself. Today, the bulk of the financial damage consists of downtime, tarnished reputations and regulatory fines.

Read More

Social Breaches Targeting C-level Executives Spike in 2018, Verizon Says

May 10 by Luana Pascu

While hackers are often driven by financial gain through extortion schemes, state-sponsored criminal groups actively targeted the public administration sector for cyberespionage purposes in 2018. 16 percent of breaches occurred in public administration where “cyberespionage is rampant,” while 15 percent affected healthcare companies and 10 percent involved financial companies, Verizon found after analyzing more than 41,000 security incidents and confirmed data breaches in the US.

Read More

No Enterprise Is A Cybersecurity Island

May 09 by George V. Hulme

While the 400 year old John Donne poem, No Man is an Island, is about the interconnectedness of the individual to humanity, it could just as easily had been written about the nature of cybersecurity and modern technology.

Read More

Poor Password Hygiene Leaving US and UK Businesses Vulnerable to Attack

May 08 by Filip Truta

New research shows that despite increasing fears around cyber threats, companies in the US and the UK are behind in implementing best practices and technology to lock down and protect passwords.

Read More

Sensitive Data Can Lurk on Second-hand Hard Drives

May 07 by Graham Cluley

As budgets tighten it’s not uncommon for consumers and organisations alike to save a few pennies, and buy previously-used IT equipment and storage devices.

Read More

Government Data at Risk as Agencies Fail to Comply with Standards

May 06 by Filip Truta

The very bodies that should set an example in protecting sensitive data are the same ones that are failing to comply with existing standards, new research indicates.

Read More

Scranos Rootkit Operation Turns Global; Enterprises to Improve Security Posture

May 03 by Harish Agastya

Sophisticated threats remain one of the main concerns in enterprises today. As environments grow in complexity, malware actors find innovative ways to infiltrate overlooked entry points in the network, hiding behind the scenes to wreak havoc without ever making a full-blown appearance.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month