Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

Jun 30 by Alina Bizga

A new report published by KnowBe4 delves into the top security challenges and issues that IT professionals and UK-based organizations face, including attack types, security initiatives and organizational limits.

Read More

Security Professionals Say COVID-19 Crisis Increased Cyber Threat to Enterprise Systems

Jun 30 by Silviu Stahie

A survey of some of the top IT security professionals who participated in the annual Black Hat USA conference underlined a key concern, with companies overwhelmingly believing that the COVID-19 pandemic increases cyberthreats. 

Read More

Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts

Jun 30 by George V. Hulme

As enterprises continue with their digital transformations by automating their manual workflows, moving existing applications to the cloud, and developing and deploying new applications at a record pace, they’re also rapidly increasing the complexity in their environments, and as a result security controls and processes that should be in place continue to slip.

Read More

World Economic Forum Outlines Core Principles for Businesses Seeking to Reduce Cyber Risk

Jun 29 by Filip Truta

An optimistic new report by the World Economic Forum predicts businesses will prioritize security in a bid to ensure longer-term success. The reason? A rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19.

Read More

The Security of Legacy Devices Should Not Be the Bane of ISPs

Jun 26 by Silviu Stahie

The Internet of Things (IoT) ecosystems may be populated by all the latest and innovative devices, but it's also home to legacy devices, which in many cases, are points of entry for adept hackers looking for a way into the infrastructure.

Read More

IT Departments May Be Helping Bad Actors with New Apps for Untrained Staff, New Research Shows

Jun 25 by Filip Truta

Rapid changes to how businesses operate offer excellent opportunities for malicious actors to access corporate networks. Infosec professionals report that phishing and whaling attacks taking advantage of unwary employees have risen during the pandemic. At the same time, IT departments are deploying new technologies to support remote work without consulting those on the receiving end, potentially fueling bad actors’ malicious campaigns against businesses.

Read More

SOC Teams Care Too Much About Detecting Cyberthreats and Not Enough About MTTD

Jun 24 by Silviu Stahie

The self-assessed effectiveness of corporate security operations centers (SOCs) seems to be overestimated by the people working in those positions, a new study from Exabeam revealed. 

Read More

Half of U.S. Businesses Have Yet to Mandate New Security Policies for Remote Workers

Jun 24 by Filip Truta

Before the COVID-19 pandemic, more than 80% of Americans had worked from home either rarely or not at all. Now, more than half are doing so, with no new security policies to help guide them, according to an IBM survey conducted by Morning Consult.

Read More

Most Employees Overestimate their Ability to Work Safely from Home, Study Finds

Jun 23 by Silviu Stahie

Most people are confident they can keep personal identifiable information (PII) secure while working from home. That comes in stark contrast with the fact that more than 50% use their laptops for work, according to a study from IBM Security and Morning Consult. 

Read More

One in Six Businesses Pay Ransom to Cybercriminals, New Research Shows

Jun 23 by Alina Bizga

Last year, one in six businesses met ransom demands of cybercriminals, according to the most recent Hiscox Cyber Readiness Report.

Read More

Number of Breached Records Continues to Soar

Jun 23 by George V. Hulme

We get so deluged with news stories about data breaches that it’s easy to lose sight of the forest for the trees. Consider, according to a newly released report from ForgeRock, the ForgeRock Consumer Identity Breach Report, which found that more than 5 billion records were exposed last year. That’s a lot of information on a lot of information pertaining to a lot of people.

Read More

Small and Medium-Sized Enterprises to Increase Cyber Insurance Spending

Jun 22 by Silviu Stahie

Most small and medium enterprises (SMEs) are planning to increase their cyber-insurance spending in the next couple of years,  according to a new industry report. 

Read More

Cloud Security Spending to Buoy the Security Market in 2020

Jun 21 by Ericka Chickowski

Enterprises are putting the brakes temporarily on security spending amid the chaos of the global pandemic, but analysts believe that 2020 will still see growth in the market. A new worldwide security and risk management spending forecast released by Gartner this week updated numbers downward, with the firm projecting infosec spending to grow 2.4% this year compared to the more rosy 8.7% it predicted in December 2019. If the stats hold, the security market will hit $123.8 billion by year end.

Read More

Misconfigurations, Poorly Managed Access Help Drive Data Breach Risks

Jun 20 by George V. Hulme

Enterprise digital transformations are making the jobs of enterprise security teams to properly manage and secure their environments even more challenging. After all, as digital transformations have rapidly increased the complexity of environments as technology teams strain to maintain existing systems, deploy new cloud services, manage IoT devices, and constantly develop and deploy more applications.  

Read More

As Layoffs Loom, Be Cognizant of Increased Insider Risk

Jun 19 by George V. Hulme

Since the very beginnings of the novel coronavirus (COVID-19) pandemic, businesses of all sizes have struggled to adjust to the new occupational normal. IT teams have not been immune to the disruption. Neither have information security teams for that matter. While employment in the IT sector remains much more resilient than other segments of the economy, employment in the IT sector still declined by about 1% last month, even as businesses compete for technical talent and continue digital transformations.

Read More

Most Forbes Global 2000 Companies Lack Basic Domain Security

Jun 18 by Silviu Stahie

Most Forbes Global 2000 organizations don’t have even basic domain security in place, leaving them open to attacks with potentially devastating consequences, according to a report from Digital Brand Services (DBS). 

Read More

The Cybersecurity Skills Gap Continues, with SOCs Lacking as Many as 10 Key Employees in 2020

Jun 18 by Filip Truta

The vast majority of security operations centers (SOCs) are confident in their ability to counter cyber threats, yet few of their frontline workers can aptly track mean time to detection, while organizations still struggle with SOC staff shortages, new research shows.

Read More

Apple Announced Open Source Password Management Initiative

Jun 17 by George V. Hulme

Passwords are a huge hassle. We all must use them, and generally hate doing so. There’s no way to sugarcoat it. The typical user has hundreds of username and password combinations that they must remember and manage. We all forget and must reset passwords regularly. And, over time, many of these accounts, along with the associated passwords, will be abandoned. And over time, they will be compromised. Because so many people reuse their passwords, those credentials will lead to data breaches.

Read More

Business That Compromise User Data Could Lose Customer Loyalty for Years

Jun 17 by Silviu Stahie

Customers will avoid businesses that compromise users’ data during the COVID-19 pandemic because of poor security practices, new research from PCI Pal has found. 

Read More

Half of Security Professionals Had No Contingency Plan in Place for COVID-19

Jun 17 by Liviu Arsene

Security has been a huge concern for both businesses and individuals as many employees continue to work from home, with many woefully under prepared for the impact that COVID-19 has had. In fact, new research by Bitdefender found half of infosec professionals (50%) didn’t have a contingency plan in place for COVID-19 or a similar scenario. These findings, and more, are revealed today in the first instalment of Bitdefender’s yet to be released global 10 in 10 Study. The section — The Indelible Impact of COVID-19 on Cybersecurity — details the pressures faced by infosec professionals during COVID-19.

Read More

Bad Actors Target Unsecure Databases An Average of 18 Times Per Day, New Research Shows

Jun 16 by Alina Bizga

Many companies accidentally leave their databases exposed on the web, and data breaches or security incidents occur daily. Unsecured and misconfigured servers often lead to data leaks that can become logistical and legal nightmares for companies, leaving the privacy and security of customers or company assets at risk.

Read More

Credit-Card Skimming Malware Hit Websites As Coronavirus Lockdown Forced Retailers to Close High Street Stores

Jun 16 by Graham Cluley

On March 20th, the Claire's accessories retail chain beloved by young girls around the world made the sensible decision to close all of its physical stores in response to the Coronavirus Covid-19 pandemic.

Read More

Beyond the Hype – Putting MDR Service Providers to the Test with Forrester

Jun 15 by Michael Rosen
  • Managed detection and response programs vary widely so carefully evaluate service provider competencies
  • Beware of buzzwords in MDR vendor claims that provide little insight into their true service capabilities
  • Focus your MDR goals on achieving superior security outcomes, not just on managing the flow of alerts
  • Effective MDR integrates people, processes, and technology to provide wide coverage at an affordable cost
Read More

DDoS Attacks Are Getting Bigger, More Complex, Research Shows

Jun 15 by Filip Truta

Even though the number of DDoS attacks decreased over 2019, their complexity and size increased significantly, according to new research from the National Scrubbing Center against DDoS attacks.

Read More

It’s Time to Step Up Linux Server and Container Workload Security

Jun 15 by Michael Rosen
  • Linux Server security historically pales in comparison to what has long been available for Windows Servers
  • Transient containers frequently run the most sensitive business workloads yet are blind to security teams
  • Security often breaks when upgrading server OS or changing multi-distro Linux configurations
  • Server Security for Linux and Containers Beta Evaluation Program enrolling now
Read More

'CallStranger' Is Exactly the Type of Vulnerability ISPs Fear

Jun 12 by Silviu Stahie

A new vulnerability named 'CallStranger' is making the rounds in the IoT world, illustrating the dire security issues that users confront every day. The vulnerability is also a perfect example of why dedicated IoT security measures are needed to cover the gaps left by manufacturers.

Read More

Frost & Sullivan: Advanced Cyber Threats Drive Increased Demand for Managed Detection and Response (MDR) Solutions

Jun 12 by Filip Truta

The increasing number of sophisticated cyber threats is set to increase demand for Managed Detection and Response (MDR) solutions from the business sector, according to a new forecast by Frost & Sullivan.

Read More

SMBs Overwhelmingly Believe They Are Ready to Deal with Cybersecurity Incidents

Jun 11 by Silviu Stahie

Most small and medium-sized businesses (SMBs) believe they are prepared for a cyberattack or any informatic disaster, but few are actually ready to deal with the aftermath of such an incident, according to new research published by Infrascale. 

Read More

Clients Often Hold CEOs Personally Responsible for Ransomware Attacks, Research Shows

Jun 10 by Filip Truta

The general public is becoming increasingly well-educated about cyber-attacks and ransomware in particular – so much so that consumers are becoming unforgiving of businesses that don't take security seriously. And when they look for someone to blame, they often point the finger at the highest ranks in the organization.

Read More

Cyber Security Continues to Evolve—And the Skills Gap Remains a Big Challenge

Jun 10 by Bob Violino

Cyber security teams are continuing to struggle with hiring and retention issues, and they have not achieved significant improvement in these areas over the past year, according to a global study released earlier this year by technology professional association ISACA.

Read More

Vast Majority of Australian Companies Believe Their Cybersecurity Is Failing

Jun 09 by Silviu Stahie

Australian companies don’t trust their current cybersecurity solution and overwhelmingly think their investments in this critical business are failing, according to a new survey of executives in all major industries. 

Read More

Study Shows Cyber Security Disconnects

Jun 09 by Bob Violino

Organizations around the world consider innovation to be a top business priority and they are captivated by the potential of emerging technologies. At the same time, however, they’re concerned about their cyber security readiness and the struggle to hire enough workers who have the right skills to meet the organization’s needs.

Read More

Why ISPs Should Keep Smart Homes Malware-Free

Jun 05 by Silviu Stahie

Most IoT devices have vulnerabilities that leave them open to DDoS attacks, according to Bitdefender's telemetry. There's no easy fix to such a complex problem, but there are clever ways to prevent smart devices from serving the malicious intents of criminals. 

Read More

Building Sustainable CISO Succession Paths

Jun 05 by Ericka Chickowski

The CISO role is rapidly evolving as organizations put more responsibility on the plates of their security and risk executives, particularly within large enterprises. In spite of that, a new survey report from security consulting firm Kudelski Security indicates that there is still "no well defined path to becoming a CISO or other senior security leader." The study shows that many organizations are still shooting from the hip when it comes to security succession planning, recruiting security specialists, and grooming senior security leaders with the skills and traits increasingly required by the business to run enterprise-class cybersecurity programs.

Read More

Security Misconfigurations a Leading Cause of Cloud Data Breaches

Jun 04 by Filip Truta

Eight in 10 companies across the United States have experienced a data breach made possible by cloud misconfigurations, according to new research by IDC.

Read More

Fewer Security Incidents Affected US Federal Government in 2019

Jun 04 by Silviu Stahie

The latest report from the White House's Office of Management and Budget (OMB) shows that the number of cybersecurity incidents dropped in 2019, partly due to better security programs and increased investments. 

Read More

Half of Enterprises Have No Dedicated Staff, Processes or Policies for IoT Security

Jun 04 by Filip Truta

Global enterprises report greater efficiency and productivity, better product/service quality, and improved customer retention and experience, all thanks to recent deployments of Internet of Things (IoT) solutions. But business leaders are also concerned about their next steps. As IoT deployments greatly expand the attack surface for cybercriminals, half of businesses banking on IoT are doing so unprepared to combat cyber risks associated with these purchases.

Read More

Enemy Unseen – Part II: Why Dark Web Monitoring Is Essential

Jun 03 by Andrei Pisau
Read More

Top 5 Endpoint Misconfigurations That Open Security Gaps [Whitepaper]

Jun 02 by Filip Truta

The term “cyberattack” brings to mind malware, social engineering, network vulnerabilities or unpatched endpoints. But how do malicious actors manage to unleash their attack kill-chain in the first place? What is it that opens the gates to exploiting a weakness and breaching the infrastructure? With human error behind most successful attacks, perhaps we should look not beyond these culprits, but behind them.

Read More

Compliance Costs Are Eating Security Budgets

Jun 02 by Ericka Chickowski

 The cost of cybersecurity compliance is rising to unsupportable levels and enterprises are going to need to act soon if they are to keep the situation from hindering innovation, according to a new report. Conducted jointly by analyst firm Omdia and security advisory consultancy Coalfire, the study shows that over half of firms across all the major verticals are spending 40% or more of their IT security budgets on compliance today.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets