Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

New Bitdefender Report Highlights Unique Security Challenges of 2020

Apr 07 by Bob Violino
  • Ransomware, banking malware, unwanted applications, and Android attacks all rose significantly
  • Pandemic-related incidents had a big impact
  • Similar threats expected for this year, and cyber security teams need to have the right security tools in place

 

Read More

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Apr 02 by George V. Hulme
  • Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
  • Such breach disclosure laws have been long found over legal concerns.
  • The EO would also establish that certain software vendors maintain a software bill of materials.
Read More

Anti-Exploit Technology is Fundamental for Cloud Workload Security

Apr 01 by Shaun Donaldson
  • All attacks include malicious activity, but not all attacks include writing malware to disk 
  • Anti-exploit technology prevents attackers from gaining a foothold 
  • What to look for in anti-exploit technology 

Attacks, exploits and vulnerabilities 

Any complete cloud workload security stack must feature robust anti-exploit technology for both end-user and server systems. Cloud workloads run on servers, either on-premises or in the cloud, and end-user systems access those workloadsEnd-user systems can give attackers indirect access to workload data, while servers can provide more direct access if attackers achieve a foothold.  

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets