Subscribe to Email Updates

Subscribe

Author: Filip Truta

Filip is an experienced writer with over a decade of practice in the technology realm. He has covered a wide range of topics in such industries as gaming, software, hardware and cyber-security, and has worked in various B2B and B2C marketing roles. Filip currently serves as Information Security Analyst with Bitdefender.

All about Virtualization and Cloud Security | Recent Articles:

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

Jul 01 by Filip Truta

New data shows a sharp increase in monthly business email compromise (BEC) attacks focused on invoice or payment fraud.

Read More

World Economic Forum Outlines Core Principles for Businesses Seeking to Reduce Cyber Risk

Jun 29 by Filip Truta

An optimistic new report by the World Economic Forum predicts businesses will prioritize security in a bid to ensure longer-term success. The reason? A rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19.

Read More

IT Departments May Be Helping Bad Actors with New Apps for Untrained Staff, New Research Shows

Jun 25 by Filip Truta

Rapid changes to how businesses operate offer excellent opportunities for malicious actors to access corporate networks. Infosec professionals report that phishing and whaling attacks taking advantage of unwary employees have risen during the pandemic. At the same time, IT departments are deploying new technologies to support remote work without consulting those on the receiving end, potentially fueling bad actors’ malicious campaigns against businesses.

Read More

Half of U.S. Businesses Have Yet to Mandate New Security Policies for Remote Workers

Jun 24 by Filip Truta

Before the COVID-19 pandemic, more than 80% of Americans had worked from home either rarely or not at all. Now, more than half are doing so, with no new security policies to help guide them, according to an IBM survey conducted by Morning Consult.

Read More

The Cybersecurity Skills Gap Continues, with SOCs Lacking as Many as 10 Key Employees in 2020

Jun 18 by Filip Truta

The vast majority of security operations centers (SOCs) are confident in their ability to counter cyber threats, yet few of their frontline workers can aptly track mean time to detection, while organizations still struggle with SOC staff shortages, new research shows.

Read More

DDoS Attacks Are Getting Bigger, More Complex, Research Shows

Jun 15 by Filip Truta

Even though the number of DDoS attacks decreased over 2019, their complexity and size increased significantly, according to new research from the National Scrubbing Center against DDoS attacks.

Read More

Frost & Sullivan: Advanced Cyber Threats Drive Increased Demand for Managed Detection and Response (MDR) Solutions

Jun 12 by Filip Truta

The increasing number of sophisticated cyber threats is set to increase demand for Managed Detection and Response (MDR) solutions from the business sector, according to a new forecast by Frost & Sullivan.

Read More

Clients Often Hold CEOs Personally Responsible for Ransomware Attacks, Research Shows

Jun 10 by Filip Truta

The general public is becoming increasingly well-educated about cyber-attacks and ransomware in particular – so much so that consumers are becoming unforgiving of businesses that don't take security seriously. And when they look for someone to blame, they often point the finger at the highest ranks in the organization.

Read More

Security Misconfigurations a Leading Cause of Cloud Data Breaches

Jun 04 by Filip Truta

Eight in 10 companies across the United States have experienced a data breach made possible by cloud misconfigurations, according to new research by IDC.

Read More

Half of Enterprises Have No Dedicated Staff, Processes or Policies for IoT Security

Jun 04 by Filip Truta

Global enterprises report greater efficiency and productivity, better product/service quality, and improved customer retention and experience, all thanks to recent deployments of Internet of Things (IoT) solutions. But business leaders are also concerned about their next steps. As IoT deployments greatly expand the attack surface for cybercriminals, half of businesses banking on IoT are doing so unprepared to combat cyber risks associated with these purchases.

Read More

Top 5 Endpoint Misconfigurations That Open Security Gaps [Whitepaper]

Jun 02 by Filip Truta

The term “cyberattack” brings to mind malware, social engineering, network vulnerabilities or unpatched endpoints. But how do malicious actors manage to unleash their attack kill-chain in the first place? What is it that opens the gates to exploiting a weakness and breaching the infrastructure? With human error behind most successful attacks, perhaps we should look not beyond these culprits, but behind them.

Read More

Executives Bypass Security Protocols for Fear IT Admins Might Peek into Their Private Lives

May 29 by Filip Truta

A point of tension between business leaders and IT departments is exposing organizations to security risks. New research shows that executives are pressuring IT administrators to ease off on security protocols when it comes to their devices, fearful that they might expose their personal lives but also because they find obeying security standards a hassle.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets