Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Threat Intelligence Best Practices

Jun 27 by George V. Hulme

As we established in the previous post, when it comes to threat intelligence, most enterprises are neither where they want or need to be. They’re not getting value out of their efforts and they often are not focused on what they need to attain actionable threat intelligence.

Read More

5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night

Jun 26 by Ericka Chickowski

Many cybersecurity leaders today express greater levels of confidence than ever before in their cloud security posture. Cloud security tools have greatly matured over the last few years and that, combined with the inevitability of cloud dominance in modern IT, has helped them reach a wary acceptance of the new normal. Nevertheless, recent research indicates that security pros are still dealing with some significant cloud risk factors that justifiably give them heart palpitations now and again.

Read More

Level of Cyber Risk to Businesses Held Steady in First Quarter According to Report

Jun 25 by Razvan Muresan

Cyber security executives and teams—and for that matter organizations as a whole—could certainly use some good news when it comes to risk assessment, and perhaps a recent report provides just that.

Read More

Cyber Risk Insurance Sector to Reach $7.5 Billion by End of the Decade, PwC Says

Jun 24 by Luana Pascu

Cyber insurance is clearly a good idea, considering the rapid growth of technology and daily malware releases. June isn’t even over and already 6.46 million new pieces of malware appeared this month, as per AV-Test. But simply because a company chooses to protect its assets in case of a breach, it doesn’t mean it will never fall victim to an attack. In today’s threat landscape, cyberattacks are inevitable. It’s no longer a matter of “if,” but of “when” the next attack will strike to encrypt valuable data or shut down a critical infrastructure.

Read More

Office 365 Proves Popular with Phishers

Jun 21 by Graham Cluley

With 180 million active users it's no wonder that Microsoft Office 365 has caught the attention of online criminals.

Read More

Defend Your Organization from Browser-based Attacks with Bitdefender Browser Isolation

Jun 20 by Shaun Donaldson
  • The web is a dangerous place, but denying end-users access isn’t realistic
  • Isolate browsers from end-user systems via application virtualization
  • Secure virtualized browsers to protect against attacks in high-risk scenarios

The Web is a Dangerous Place Which Users Need

Read More

Companies Deploy IoT Solutions but Are Confused about Achieving Goals

Jun 19 by Luana Pascu

Organizations are ever more enthusiastic about IoT opportunities and what they could achieve through automation. But this exuberance is tempered by concerns such as how to reach company goals and which solutions would take them there, according to research by Informa Engage for Longview IoT, a Carnegie Technologies company.

Read More

In Incident Response, Speed Is Everything

Jun 14 by Filip Truta

Data breaches, a rare occurrence not too long ago, have become the norm, forcing enterprises worldwide to adopt a paranoid posture with regards to the likelihood of disruption and loss of business.

Read More

Incident Response Is the Weakest Link in the Threat-Handling Chain, Study Shows

Jun 12 by Filip Truta

Faced with a growing army of cyber criminals constantly after their data, businesses are investing heavily in new technology and professionals to close the cybersecurity gap. While this sounds promising, most organizations are making very slow progress towards cyber resilience.

Read More

Even with the Greater Emphasis on Cyber Security, Many Organizations Still Struggle to Protect Themselves

Jun 10 by Razvan Muresan

With all the recent emphasis on cyber security and the seemingly endless reports about how the focus on prioritizing data protection has risen to the board and C-suite levels, many organizations apparently are still struggling to defend themselves properly against the growing array of attacks.

Read More

Is Security Everyone’s Business?

Jun 07 by Gavin Hill
  • There is no security silver bullet 
  • Review of the complete attack timeline of Cobalt Strike
  • Layered defenses need to work together
Read More

U.S. Businesses Lost $654 Billion from Cyberattacks in 2018

Jun 06 by Filip Truta

Cybercriminals exposed 2.8 billion consumer data records in 2018, costing U.S. organizations over $654 billion. Healthcare, financial services and government were the sectors hardest hit by cyberattacks, new research shows.

Read More

CISO Hesitancy about Public Cloud Leaves Data Centers to Run Most Workload by 2021

Jun 05 by Luana Pascu

Enterprise privately-owned data centers form the core of IT infrastructure, but they are getting overcrowded and could soon be looking at major efficiency issues.

Read More

Are CISOs Starting to Crack Under Pressure? New Research Suggests They Need More Support from Peers

Jun 04 by Filip Truta

Too many CISOs are under constant pressure to defend their organization from cyber threats. They are feeling unsupported, and it’s taking a toll on their mental health, according to a new study.

Read More

Unlearned Lessons of the Past and the (Not So) Secure Smart City of the Future

Jun 03 by George V. Hulme

The concept of the city of the future is both inspiring and frightening. 

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month