As worries about third-party risks continue to press on the minds of technology decision-makers within organizations large and small, many technology service providers are finding security to be a key differentiator for winning over prospects. Cyber warranties could be the next big way to help them signal to customers that they're serious about security risks.
All about Virtualization and Cloud Security | Recent Articles:
Quantum computing may sound like science fiction, but it's coming down the pike faster than you might expect. And if security practitioners don't start taking this impending advancement seriously now, they could be facing the wholesale obscelesence of their corporate cryptographic protections within a decade.
When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an Internet of Things (IoT)-powered botnet, cybersecurity experts warned that this was just the warm-up act. Mirai marked the first splashy real-world example of the kind of attacks that the bad guys could carry out when harnessing the power of IoT devices in a well-controlled botnet. And as predicted by experts following the rollout of Mirai, the hits just keep coming via IoT botnets.
The last year has proved out about security naysayers' warnings about the undisciplined use of cloud architectures. While many organizations work hard to secure data stored on cloud stores, the truth is that there's a lot of work to go. That fact is made abundantly clear by the growing number of incidents caused by extremely poor security hygiene within Amazon Simple Storage Service (S3) storage buckets that are holding very sensitive information.
Life in the SOC has grown a lot more complicated in the last few years as the major forces of cloud and software-defined networking (SDN) adoption have started to converge on enterprise IT in a very big way.
After several years of peeking through the programming as a very niche topic at RSA Conference, DevOps has broken through to the limelight this week. The show has featured a number of talks and panels that discussed the security implications of DevOps and the corresponding increased dependence on cloud platforms and containerization in delivering IT services.
Another year came and went and the breach statistics were once again smashed by a raft of data compromises and thefts across the private and public sectors. According to the Identity Theft Resource Center, the number of compromised records more than doubled from 2014 to 2015. And Ponemon Institute estimates that the cost of those breaches just keeps rising--6 percent over the past year.
Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to turn it up a notch sometimes and call it rogue IT. Many IT executives look at shadow IT as a disease. It’s scary and risky for end users to go out and get their own SaaS solutions without IT approval or knowledge. It’s even scarier and riskier when the DEV team goes out and spins up a bunch of Amazon instances to essentially stand up an entire shadow data center for some project or other.
The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert over the last decade for breach events that threaten consumer privacy due to the negligence of businesses.
Revelations by security researchers this week are showing just how prevalent malicious advertising, better known as malvertising, has grown on the biggest publishing sites on the web. According to reports out from Black Hat, this year has seen nearly a three-fold
Cloud security concerns are starting to dissolve away as security technology and risk management practices mature in cloud and virtualized environments.