- Federal agencies across the US have increased deployment of network visibility solutions
- Most IT leaders equate network visibility to a robust cybersecurity posture
- Automated threat detection is an essential feature of a network visibility solution, according to 24% of IT leaders in the federal sector
All about Virtualization and Cloud Security | Recent Articles:
US Federal Sector Accelerates Investments in Network Visibility to Cope with Telework Security Risks
Oct 30
by
Filip Truta
- Ryuk ransomware poses a credible and imminent threat to US healthcare industry, claims advisory from the FBI, CISA, and HHS.
- Hospitals told to harden their defences and ensure they have a mitigation strategy which can be deployed quickly.
- The use of artificial intelligence (AI) technology for cyber security is on the rise, according to recent research
- Cloud-based AI security products are expected to grow quickly
- Organizations are adopting AI-based tools to identify threats, reduce response time, and improve techniques to find issues that require immediate action
- Cybersecurity awareness experts say their organization’s current security posture would be weaker if the existing IT security budget focused solely on technical solutions
- 100% claim training staff in IT security has a positive effect on the company’s error culture
- 96% agree that cybersecurity awareness contributes to a higher overall security level
- Organizations must prioritize workforce behavior in relation to data and machines as a pillar of their next-generation IT strategies
- Passwords remain one of the biggest problems of the modern digital world
- Users make the same mistakes, over and over
- Even high-profile users like the president of the United States makes the same mistakes
10 Months into COVID-19, Businesses Still Playing Catch-Up with Endpoint Security in Hybrid Work Environments
Oct 27
by
Filip Truta
- New survey shows IT teams were not fully prepared for the sudden transition to remote work
- 10 months in, secure access and endpoint security remain a top challenge in enabling hybrid work environments
- 66% of IT pros believe the COVID-19 situation will spur increased cybersecurity investments
- Pandemic created new attack vectors
- Supply chain compromise is the main fear of public sector employees
- Ransomware remains one of the biggest threats during the work-from-home period of the pandemic
- Take time to understand your audience before building your brand strategy and messaging.
- Always remember that when you talk to everyone, you reach no one.
- Studies show that 54%* of consumers want to see more video content from a brand or business they support (HubSpot, 2018).
Why Communication and Culture Are So Important for a SOC Analyst while Working 100% Remote during COVID
Oct 23
by
Josiah Germain
- Has team culture been lost as a result from working from home?
- Communication is key to maintain morale
- Types of communication have varying levels of effectiveness
Cybersecurity Investments To Support Work from Home. How To Spend Wisely in 2021?
Oct 23
by
Andra Cazacu
- Prioritize the right device security technologies
- Hardening features should be enabled now
- Services are turning into an ally for infosec teams
A Third of CISOs Have Relaxed Security Policies to Foster Remote-Work Productivity During COVID-19, New Research Shows
Oct 23
by
Filip Truta
- Study brings to light the CISO’s dilemma: enhance corporate security or enable worker productivity
- Legacy remote access solutions leave much to be desired in the eyes of CISOs
- Half of CISOs believe security measures affect productivity when scaling remote-first policies
- 35 percent have relaxed security policies to foster greater productivity among remote workers
- 39 percent have left their security policies the same, either because they are comfortable with their company’s security posture or because they don’t know what changes to make
- The smart home market is rapidly growing, and the work from home movement has proven to be even more of a catalyst.
- Consumer IoT devices are fraught with vulnerabilities, and consumers don’t know how to protect their networks.
- Consumer IoT devices on home networks place enterprise systems at risk, and enterprises must take necessary steps to protect themselves.
Enterprises Increasingly Choose Threat Intelligence as the Go-To Weapon to Fight Advanced Threats
Oct 21
by
Filip Truta
- Threat intel helps organizations navigate an ever-expanding threat landscape
- TIP market to reach $234.9 million by 2022 from $132.7 million in 2019, for a compound annual growth rate (CAGR) of 21%
- TIP represents one of the niche markets in cybersecurity that will be least affected by COVID-19, Frost & Sullivan analysts forecast
- Nigeria is no longer the hub of BEC operations
- Many cybercriminals now operate from inside the US
- BEC scammers use people working from home to help them get a hold of the money
- IoT security problems are not evident to regular users
- Top ten IoT security issues
- Exploring the most simple solutions
Cybersecurity Professionals Feel Threatened by the Adoption of AI and Automation Tools, Survey Finds
Oct 19
by
Silviu Stahie
- AI, machine learning and automation aid in cybersecurity
- People feel threatened by the adoption of new technologies
- Cybersecurity specialists recommend their field as a career option
Two-Thirds of Businesses Have Suffered Endpoint and IoT Security Incidents During COVID-19
Oct 16
by
Filip Truta
- Endpoint and IoT security incidents escalate in the past 12 months as employees are forced to work remotely
- The top 3 issues cited by IT decision-makers are malware (78%), insecure network and remote access (61%), and compromised credentials (58%)
- Respondents cite failure to discover, identify and respond to unknown, unmanaged or insecure devices accessing network and cloud resources
- The most critical capability required to mitigate security incidents is monitoring endpoint or IoT devices for malicious or anomalous activity
Unprecedented Number of Cyberattacks Hit UK Businesses Amid Pandemic Lockdown
Oct 15
by
Silviu Stahie
- UK companies see a 13 percent increase in the number of cyberattacks
- The majority of attacks originate from China and Taiwan
- File-sharing applications were the main targets
Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening
Oct 14
by
Bob Violino
- The cyber security skills gap continues to get worse, according to the latest research
- Among the top ramifications for cyber security teams are an increasing workload, unfilled jobs, and an inability to learn or use cyber security technologies to their full potential
- Security and business executives need to work together to address the issue more effectively
- Information security policies are not grounded in the realities of an employee’s work responsibilities
- Physicians who are dealing with emergency situations constantly are more likely to leave a workstation unlocked
- Security professionals must find ways to seamlessly integrate ISP compliance within specific job tasks
The year’s buzz-worthy performers? The award (and path to profitability) goes to MSPs.
Oct 13
by
Heather Harlos
- Channel resellers keep everyone connected and productive in our new work-from-anywhere world
- Managed Service Providers are closing sales when nobody else can
- The show must go on. If you’re ready to see how becoming an MSP can help you thrive in today’s uncertain market, register for our free OnDemand webinar!
- Many organizations don’t monitor people working from home
- Some employees are unhappy with how the IT department is solving their problems
- The shadow IT security issue has only increased during the pandemic, with people using unsanctioned apps for work tasks
New IoT Bots Reveal Why ISPs Have to Shoulder the Responsibility for Cybersecurity
Oct 12
by
Silviu Stahie
- New IoT botnets are always lurking on the horizon
- Users have an ever-increasing inventory of IoT devices to keep track off and it’s starting to become a hassle
- The protection of a smart home shouldn’t be the consumer’s full-time job
- Only 20% of organizations believe they've reached full DevSecOps maturity
- Nine in 10 DevOps organizations have experienced a security incident in their Kubernetes and cloud environments
- Approximately 60% of developers say they get little to no secure coding training
- Employees want to keep working remotely but admit they are not as productive as in the office
- A third of remote workers consider IT security a low priority
- Almost half of global employees don’t fully understand the notion of a phishing attack
- Business owners don’t believe they are a likely victim in cyberattacks
- Many businesses still don’t have cyber insurance
- 40 % of regular consumers think they criminals never targeted them
- 65% of IT and security managers say the cybersecurity skills gap has negatively impacted their team's performance
- Cost and lack of time are cited as the biggest impediments for security pros to improve their skills
- Most organizations had declining, stagnant, or non-existent security training budgets
A Quarter of Canadian IT Decision Makers Report Coronavirus-Themed Cyberattacks During Pandemic
Oct 08
by
Alina Bizga
- 25% of Canadian IT decision-makers report they suffered a COVID-19-themed cyberattack
- IT teams from private and public sectors forced to create in-house policies and cybersecurity trainings for remote workers
- Only 36% of organizations have informed a regulatory body after suffering a data breach
- More than half of organizations have given employees a corporate device for remote work
- 37% of employees say they are not restricted from activities like visiting unsecured websites, sharing personal information, or downloading unvetted software
- 54% of users would still visit a website after receiving a warning about potential security risks associated with the site
- Eight in 10 organizations report that their cybersecurity practices are improving
- Executives, directors, business units and outside firms are now directly engaged in conversations and decisions on cybersecurity matters
- COVID-19 and the shift to remote work have heightened awareness of the need for strong cybersecurity
- Most people want to work exclusive from home
- Older people value remote work more that the younger generation
- 35 percent of companies didn’t provide cybersecurity training to employees
- Get up to speed on the key dynamics of the 2020 cyberthreat landscape, including ransomware, phishing and vulnerabilities
- Explore the long-term impact of WFH on your cybersecurity posture
- Understand key security measures that will strengthen your employee devices
- Learn from our leading cybersecurity experts and Forrester guest speaker, Senior Analyst Chris Sherman
- Demand for ransomware payments skyrockets during the pandemic period
- Companies that pay ransomware actors, including cyber insurance firms, will face potential sanctions for their actions
- Department of the Treasury says ransomware payments benefit illicit actors and can undermine national security
- The smart homes are already here and are getting more intelligent by the day
- IoT security was sacrificed for deployment speed
- Consumers need to look for ISPs that can protect their cyberhomes
- Aligning organizational business objectives with security has always been challenging
- New initiatives are often kicked-off without security being a consideration
- Analyst firm finds, when security and business objectives are aligned, there are tangible business benefits
Research Finds 450% Increase in Remote Employees Circumventing Security to Mask Online Habits or Steal Data
Oct 05
by
Filip Truta
- 56% of companies say their remote workers actively bypassed security controls to obfuscate online activity
- 70% of the incidents included at least one attempt to circumvent a second security control to exfiltrate data without detection
- 72% of companies surveyed saw data theft attempts by a departing employee wanting to take protected IP with them
Cybersecurity Takes Top Tech Priority as COVID-19 Spurs Transformation Projects
Oct 03
by
Filip Truta
- Survey of over 600 IT leaders reveals the extent of COVID-19 disruption from a technological standpoint
- Areas like cybersecurity, network infrastructure and cloud strategy need urgent adaptation for a distributed workforce
- Cybersecurity is the top technology priority for digital transformation projects
- 60 percent of users employ one or more passwords across multiple accounts
- Cyber criminals exploit user negligence to steal credentials and attempt logins across various sites
- The increasing prevalence of credential stuffing attacks correlates with an increase in leaked credentials available on the dark web
- Many reports received by the FBI indicate the use of botnet credential stuffing
- 36% of respondents say they don’t need privileged access to do their jobs but have it anyway
- 85% of IT pros say the risk is either unchanged or increasing in the next 12 to 24 months
- 60% of respondents working in government find it difficult to detect insider threats because behavior is consistent with the individuals’ role and responsibility
- Respondents in the commercial sector say their current cybersecurity tool stack yields too many false positives and more data than can be reviewed in a timely fashion
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)