Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Detecting and Stopping Malware Threats Within Your Content Delivery Networks

May 27 by Shanice Jones

CDN providers and SaaS companies with content-sharing components (such as DropBox, WeTransfer, SharePoint,etc) are increasingly targeted by cyber criminals for malware. The ease with which users can upload and share content is obviously key, but unfortunately, it is equally appealing for malicious actors to attach malware contents. 

Read More

Bitdefender’s Position on Ransomware Attacks and Decryptors

This week Bitdefender was named in a press article regarding our decision to release a free decryptor in January 2021 to help those affected by Darkside ransomware. The authors of the article assert that publicly releasing a ransomware decryptor enables malicious actors to modify their methods to evade future decryption, thus increasing the risk of successful future attacks.

Read More

A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

May 25 by Bogdan Carlescu

In the third and last part of the blog series on Practical Cyber Resilience, I will cover the Approaches, Tactics and Techniques that an organization should use when developing options for improving cyber resilience. In the previous blog, I detailed the practical five-step Cyber Resilience Analysis Process recommended both by NIST and MITRE for enhancing cyber resilience.


Read More

Honoring Our 2021 CRN Women of the Channel

We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather Harlos, Paula Enache, Randi Fleming and Samantha Sisk have been honored by CRN in the 2021 Women of the Channel list.

Read More

Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals

On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on Improving the Nation’s Cybersecurity (and the government issued a fact sheet summary of the contents). U.S. Presidents use Executive Orders (EO) to provide guidance to federal agencies as part of enforcing laws passed by Congress and managing the executive branch of the U.S. Government. This EO is the most detailed ever issued on the topic of cybersecurity in the nation’s history. It has global implications because of the size of the U.S. Federal Government and its purchasing authority for cybersecurity solutions – estimated to be nearly $20 billion annually.

Read More

Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events

May 19 by George V. Hulme

As new threats hit enterprise systems and light up enterprise security dashboards, security analysts need to make swift and accurate decisions so that they can respond in the best way possible. Yet, so many alerts come at any given time that the ability for the typical security team to focus on the alerts that matter can seem impossible.


Read More

Digital Transformation Shouldn’t Require a Security Transformation

May 18 by George V. Hulme

It’s often asked, why can’t security innovate more?


Read More

It's Time Security Teams Begin Prep for Quantum Computing

May 17 by George V. Hulme

It seems that every week new news breaks regarding the progress toward reaching practical quantum computing. While this is excellent news for the promised benefits quantum computing will provide, it helps society tackle the biggest problems in computing that traditional computers just can't handle. These include potential breakthroughs in artificial intelligence, the complex modeling involved in nuclear fusion, improved solar cells, cancer, and disease treatments, and financial markets modeling.


Read More

Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations

May 13 by Filip Truta

Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. Unlike one-off hackers, APTs distinguish themselves through novel attack techniques, cunning lateral movement across the victim’s infrastructure, swift malware deployment, efficient data exfiltration and – perhaps most importantly – stealthy operation to avoid detection by cybersecurity tools.

Read More

Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption

May 12 by Bogdan Botezatu

Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a private operator of the largest refined products pipeline in the United States, transporting more than 100 million gallons of fuel daily, announced they were a victim of a ransomware attack by the organization known as “Darkside.” The attack propelled Colonial to take systems offline, halting operations and threatening to cause the price of oil to rise.

Read More

How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost

May 07 by Bogdan Carlescu

Security operations are expensive! Hiring, training, and keeping a team of security analysts demands significant resources from any organization wanting to run security operations in-house. There are many studies which show the urgent need to improve security operations center (SOC) analysts’ productivity.

Read More

Defending against Email Threats that Don’t Involve Malware

May 05 by Mia Thompson
  • The threat landscape continues to evolve in terms of complexity
  • Email is still the weakest link in the security chain and neglecting email security can leave your customers’ networks vulnerable to attacks
  • Many legacy solutions can’t fend off today’s modern attacks
  • Investment in modern email security is essential to protect against sophisticated attacks
Read More

The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant

May 05 by Bob Violino
  • Ensuring data privacy is now a worldwide concern, with many countries adopting data protection laws
  • Much work still needs to be done to ensure the privacy of information
  • Tools and training are keys to success
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets