As Business Insider reports, Palo Alto Networks has suffered a data breach.
All about Virtualization and Cloud Security | Recent Articles:
Palo Alto Networks Employee Data Breach Highlights Risks Posed by Third Party Vendors
While most individual security analysts today are still overworked and battling burnout, the good news is that the process and organizational support they need is improving across the industry. A new report out last week shows that security programs are growing more mature and performing better as the number of organizations with formal security operations centers (SOC) experiences a huge spike.
Spate of Ransomware Attacks on Healthcare Providers Raises Serious Health Concerns
Ransomware operators don’t discriminate between targets, hitting everything from industrial control systems and government agencies to small businesses and regular people sitting at home watching YouTube. Depending on the target, the damage can range from mere nuisance to catastrophe.
It turns out, if recent research is any indication, when one company is breached in a vertical market other companies in that vertical market become less attractive places for investors to stick their capital. Yet, when companies share their cybersecurity risk management they significantly outperform their peers that don’t disclose their cybersecurity efforts.
Let Bitdefender take care of your Business Security over the Holidays
The holidays are a chaotic time for everyone, especially small business owners. Not only are they caring for the needs of their family, they are delivering their customers the excellent service that small business owners pride themselves on.
Why do organizations get breached? With all the investments in cybersecurity breaches still, occur. Details vary from case to case but if you boil down to the bottom of the incident you will most likely find the same basic story: lack of visibility and ineffective response to the emerging threats. Too many systems and too many tools, combined with limited human resources are usually strong contributors to the problem.
Smaller DDoS Attacks Against Organizations Quadruple on Year in Q3, Survey Shows
The number of smaller and more concentrated DDoS attacks (distributed denial-of-service) has increased in Q3 2019, highlighting a new trend that seems to be gaining momentum, according to research from online risk analytics firm Neustar.
According to a new study, 2019 has been yet another brutal year for healthcare cybersecurity. In 2019, so far, nearly four out of five breaches in the industry struck health care providers. And 53% of those attacks were at the hands of external attackers, respondents to a new survey said.
With the holiday season fast approaching, American consumers already know who to hold responsible if their credentials are stolen in a data breach. 68% of the shoppers say banks should shoulder part of the blame, no matter where the breach occurred.
Prevent alert fatigue with actionable threat intelligence
Suspicious. Suspicious. Suspicious. You scroll down as you sift through your thousandth false positive today. And it’s not even noon. You take a small break, after one last glance at the screen. After all, no real threat has been detected in months. What could go wrong?
Record Number of Breaches and Leaked Records Registered in 2019, Study Shows
2019 is on track to set a record for the highest number of security incidents ever recorded, with 5,183 data breaches and 7.9 billion records exposed by November in the United States alone, according to a report from Risk Based Security.
The Underworld Economy
Imagine a world in which you could simply click onto a website to buy drugs, weapons, fake IDs, malicious software and ‘how to’ guides for building AK47s. In just a button press, you could own just about any illegal item you can think of. In the realm of the dark markets, this world, or underworld, is very much a reality.
Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows
The lack of certified cybersecurity professionals is felt throughout the world, and the industry would need to more than double the number of staff to meet the market’s needs, according to a study by (ISC)². As it stands, the supply of qualified labor only meets around 40% of demand.
CISOs, CSOs, and CIOs are not the only C-level executives with a deep concern about cyber security. New research shows that CFOs appear to be taking a more active role in ensuring that their organizations are protected against data breaches, hacks, malware, and other threats.
PayPal has now overtaken Microsoft to become the favorite target of phishing campaigns, according to a third-quarter 2019 report by email security firm Vade Secure.
The number of phishing campaigns has been expanding steadily in recent years as cybercriminals target both private individuals and corporations with social engineering scams, according to the Anti-Phishing Working Group (APWG).
WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to have the same disruptive potential as EternalBlue (the exploit responsible for WannaCry) if sporting worm-like behavior, especially since RDP is a commonly used service in organizations, allowing IT and security teams to remotely dial into machines.
- Virtual data center security must be agile and mapped in real-time to virtual infrastructure management tools
- Offloading of anti-malware scanning improves user experience, reduces redundant scans, and provides high availability
- Born-secure VM instantiation ensures compliance, improves virtualization density, and minimizes application latency
Throwing More Money at Cyber Security Challenges Will Not Necessarily Address Them—Companies Need to Spend Wisely
Here’s a disturbing bit of information: a large number of IT security leaders and teams don’t know if cyber security tools are working as they should, despite organizations investing millions of dollars in such technology each year.
Cybersecurity trends are always evolving. And the Security Industry Association, a trade group that focuses on physical and cyber security, believes it has identified the security “megatrends” that will dominate the immediate and long-term changes within the international security industry.
Transparent Cybersecurity Policies Make Companies More Attractive to Investors
Companies that are transparent about their cybersecurity risk management efforts are more attractive to investors, after or before a data breach happens in their industry.
The biggest worry for companies should be employee negligence, which remains the primary factor in data breaches, the Bitdefender Hacked Off! survey revealed.
During the 1964 Free Speech Movement at the University of California, Berkeley, activist Jack Weinberg said: “Don’t trust anyone over 30.” Well, when it comes to cybersecurity, it may be more accurate to say Don’t trust anyone under 30.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)