- An overwhelming majority of business and technology executives worldwide plan to shift their cyber security strategies due to the pandemic, according to a new study.
- One of the most prominent trends has been an accelerated push to digital transformation, and this has had a big impact on cyber security.
- The role of the CISO has never been more critical to organizations’ survival and growth.
All about Virtualization and Cloud Security | Recent Articles:
- Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
- Five key factors are influencing the cyber threat landscape.
- By taking certain steps, organizations can build a more security and agile environment.
- Fewer organizations are taking steps to mitigate cyber security risks compared with a year ago, even though the level of concern about threats has increased during the pandemic, according to a survey of business leaders.
- Nearly one quarter of the respondents said their company had been a victim of a cyber event.
- Cyber security concerns appear to be driven by the impact of the pandemic on businesses’ operations and workforces.
- Enterprises should consider taking certain steps to help reduce risk during a time of ongoing uncertainty and remote workforces.
- The need for strong data governance has become a focal point for many organizations in recent years
- The coronavirus pandemic and resulting move to a work-from-home model has forced IT executives to reimagine data governance plans, according to a recent report
- A majority of IT executives said employees are not doing enough to safeguard sensitive data
- Organizations are taking steps to enhance content management and data governance
- The use of artificial intelligence (AI) technology for cyber security is on the rise, according to recent research
- Cloud-based AI security products are expected to grow quickly
- Organizations are adopting AI-based tools to identify threats, reduce response time, and improve techniques to find issues that require immediate action
Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening
- The cyber security skills gap continues to get worse, according to the latest research
- Among the top ramifications for cyber security teams are an increasing workload, unfilled jobs, and an inability to learn or use cyber security technologies to their full potential
- Security and business executives need to work together to address the issue more effectively
Many Consumers Don’t Trust the Way Companies are Using Their Data—and Businesses Need to Change that Perception
- Data privacy, particularly for personally identifiable information, has become more important for consumers.
- Many consumers do not trust how companies are using their data.
- Businesses need to take steps to ensure optimum data security and privacy.
- More organizations are moving applications and data to the cloud, driven in part by changing work environment caused by the pandemic
- Ensuring data security is a key challenge in taking full advantage of public cloud resources
This year has seen a few dramatic trends that directly affect IT, in large part results of the global health crisis: the massive shift to a work-from-home model, a significant increase in e-commerce activity, and a big jump in the use of videoconferencing and other collaborative tools—to name a few.
Even Prior to the Pandemic and Work-From-Home, Many Organizations Were Bolstering Cyber Security
The coronavirus pandemic has created a number of new cyber security threats and vulnerabilities, not the least of which is the need to support a massive shift to remote work. The worldwide health crisis has presented hackers and other cyber criminals with opportunities to take advantage of the upheaval in business.
The coronavirus pandemic has presented a “once-in-a-lifetime opportunity for hackers and online scammers,” according to a new report from the Information Systems Security Association (ISSA), a community of international cyber security professionals, and independent industry analyst firm Enterprise Strategy Group (ESG).
Cyber Security a Big Concern of Local and County Government Technology Leaders
Cyber security and data loss prevention dominate the daily concerns of local and county government technology leaders, according to a survey report by the Computing Technology Industry Association (CompTIA) and the Public Technology Institute (PTI).
Report Says Data in the Cloud is Creating ‘Fear and Trust’ Issues for Security Professionals
A patchwork of tools, the presence of misconfigured services, and confusion around data security ownership in the cloud has created a crisis of confidence among IT security professionals that will only be fixed by organizations making security part of their business culture.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (5)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)