Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users

Jan 29 by Graham Cluley

Fraudsters found a way during the recent holiday season to take advantage of users' "Out of office" messages to sneak messages into business inboxes.


Read More

Looking for an alternative to Symantec Endpoint Protection?

Jan 28 by Peter Craig

“There are far better things ahead than any we leave behind.”

 C.S. Lewis

Read More

Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats

Jan 25 by Bob Violino
  • Financial services firms are major targets of cyber attacks
  • A recent report describes six “extreme but plausible” future cyber threats finance firms need to be aware of when thinking about which industries are prime targets for cyber security breaches, financial services certainly comes to mind. 
Read More

The 2020 Year in Cybersecurity Review

Jan 25 by George V. Hulme
  • When it came to healthcare security, 2020 proved to be a continuation of the state of cybersecurity in prior years.
  • While there was considerable concern about some type of digital attacks during the U.S. presidential elections, so far, there's been no credible evidence showing such occurred.
  • One of the more interesting attacks last year was one everyone had the opportunity to watch occur in real-time. And that's the Twitter attack that resulted in the widespread tweeting of a bitcoin scam the summer.
Read More

If the US President Can’t Secure His IoT Devices, Can You?

Jan 22 by Silviu Stahie

People’s homes are full of cameras and microphones, which in theory allow attackers to do more than just hijack your IoT devices for a DDoS attack. The extent of IoT security problems should worry everyone, especially since many homes lack essential protection. And few service providers can offer this kind of protection.

Read More

Q&A: Discussing Bitdefender Business Solutions Group’s Growing Momentum

Jan 20 by Steve FIORE

Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part by enterprise demand for endpoint protection and threat detection and response services to counter cybercriminals capitalizing on the global pandemic. 

Read More

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

Jan 15 by Silviu Stahie
  • IoT manufacturers often favor speed of rollout over security
  • Attackers don’t have to work too hard to compromise smart devices
  • It’s up to users and ISPs to protect homes and network infrastructure
Read More

Pandemic’s Impact on Cyber Security is Far Reaching

Jan 14 by Bob Violino
  • An overwhelming majority of business and technology executives worldwide plan to shift their cyber security strategies due to the pandemic, according to a new study.
  • One of the most prominent trends has been an accelerated push to digital transformation, and this has had a big impact on cyber security.
  • The role of the CISO has never been more critical to organizations’ survival and growth.
Read More

Three Security Headaches in 2021 and the Technologies to Fix Them

Jan 06 by Filip Truta
  • Remote workers have become lucrative ground for lurking cybercriminals
  • Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages
  • IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit
  • The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation
  • Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures
Read More

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

Jan 05 by Filip Truta
  • 80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans
  • IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern
  • Digitally mature organizations stand out in their frequency of performing technology audit risk assessments
  • 67% of organizations do not classify themselves as digital leaders
  • ‘Cyber breaches’ are consistently a primary concern across key industry sectors
Read More

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Jan 04 by Bob Violino
  • Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
  • Five key factors are influencing the cyber threat landscape.
  • By taking certain steps, organizations can build a more security and agile environment.
Read More

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets

Posts by Month