In 2001, a team of 30 cyber security experts in Romania had a dream: to provide excellent protection in the rapidly growing, often dangerous new world of the internet. Today, more than 1,300 security experts on three continents work passionately to offer security solutions for more than 500 million users in 150 countries.
All about Virtualization and Cloud Security | Recent Articles:
Enterprise resource planning (ERP) continues to be a mainstay of corporate IT, providing the backbone for a variety of business processes including finance, human resources, procurement, and services.
Speed is the critical factor in mitigating the damage of a cyber attack, and will remain so for the foreseeable future. This is according to 74 percent of the C–level information security executives who participated in our brand new Small Gains, Big Wins Study, which looks at the cyber security attitudes of 250 CIOs/ CISOs/ CSOs in UK-based companies with 500+ employees.
Security threats are keeping CISOs awake at night. We have this on good authority: around two thirds (65 percent) of C-level information security executives surveyed admitted to it as part of our brand new Small Gains, Big Wins Study, which looks at the cyber security attitudes of 250 CIOs/ CISOs/ CSOs in UK-based companies with 500+ employees.
The individuals charged with running an organisation are actually the most likely to expose it to a major cyber attack, according to information security executives.
Recent months have seen a dramatic reshaping of the cyber security threat landscape, according to the “Global Threat Landscape Report—2017,” by Bitdefender.
As 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the upcoming malware developments that will likely emerge in the year to come. Bitdefender experts predict an increase of zero-day exploits leaked from security agencies the world over, and massive changes to the way ransomware operates.
The past few months have spurred a dramatic reshaping of the threat landscape. Traditional threats such as generic Trojans, ransomware and spam bots have been massively complemented by data destructors. Powered by military-grade code allegedly leaked from the NSA, both WannaCry and GoldenEye wrought havoc throughout Q2 and Q3, shutting down businesses and causing unprecedented operating losses.
What were the biggest cyber security culprits in the first half of 2017 from a data breach standpoint? Identity theft and poor internal security practices, according to the latest Breach Level Index (BLI) Report by Gemalto.
In observance of National Cyber Security Awareness Month, Bitdefender offers a series of articles on hot topics such as best practices in online safety and protecting your company’s assets and integrity. We also suggest prerequisites to consider before seeking a career in cybersecurity. We encourage you to bookmark this blog or connect with Bitdefender on LinkedIn or Twitter to receive follow-on articles (filled with security tips) as they are published.
Two of the more notable trends in IT today also happen to be inter-related: the rapid growth of cloud computing services and the rising need for more effective cyber security solutions.
Among the riskier activities enterprises can undertake are merging with or acquiring other businesses—and not just for the financial considerations involved. Mergers and acquisitions (M&A) present a number of cyber security risks that might not even be on the radar screen when merger discussions first begin.