Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

Jan 15 by Silviu Stahie
  • IoT manufacturers often favor speed of rollout over security
  • Attackers don’t have to work too hard to compromise smart devices
  • It’s up to users and ISPs to protect homes and network infrastructure
Read More

Pandemic’s Impact on Cyber Security is Far Reaching

Jan 14 by Bob Violino
  • An overwhelming majority of business and technology executives worldwide plan to shift their cyber security strategies due to the pandemic, according to a new study.
  • One of the most prominent trends has been an accelerated push to digital transformation, and this has had a big impact on cyber security.
  • The role of the CISO has never been more critical to organizations’ survival and growth.
Read More

Three Security Headaches in 2021 and the Technologies to Fix Them

Jan 06 by Filip Truta
  • Remote workers have become lucrative ground for lurking cybercriminals
  • Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages
  • IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit
  • The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation
  • Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures
Read More

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

Jan 05 by Filip Truta
  • 80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans
  • IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern
  • Digitally mature organizations stand out in their frequency of performing technology audit risk assessments
  • 67% of organizations do not classify themselves as digital leaders
  • ‘Cyber breaches’ are consistently a primary concern across key industry sectors
Read More

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Jan 04 by Bob Violino
  • Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
  • Five key factors are influencing the cyber threat landscape.
  • By taking certain steps, organizations can build a more security and agile environment.
Read More

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets