With cybercrime showing no signs of slowing down in 2018, security leaders are looking to find and invest in the best tools and approaches to combat their adversaries. Yet the cat-and-mouse-game continues, as hackers get more innovative every day, sometimes outpacing even the best cyber defenses.
All about Virtualization and Cloud Security | Recent Articles:
Despite spending billions on preventing data loss, the C-suite is demonstrating a stark disconnect between business policy and personal behavior. Many admit to stealing intellectual property (IP) from a former employer, while others are taking hacker attacks as such a certainty that they are literally stockpiling crypto-cash to pay off hackers in the event of a breach.
Enterprises are progressively moving their workloads to multiple cloud (multi-cloud) providers, migrating their mission-critical applications to an environment that facilitates performance, management and scalability. This novel strategy shifts focus away from cutting costs and towards increased performance and security, while enabling organizations to stay innovative and competitive, new data shows.
2018 will be remembered by many in the corporate world as the year the GDPR kicked in. Every organization covered by the EU’s new regulation had a year’s heads up to ensure conformity, yet few today are 100% compliant. However, new data suggests a few good reasons behind businesses’ extra diligence in their approach to this pressing issue.
The past few years have seen IT chiefs take on more and more duties towards achieving cyber resilience for their organizations. Little do their higher-ups know that different ranks across the company must now shoulder those responsibilities to accomplish this mission. And if recent studies are any indication, CIOs and CISOs still have a ways to go to persuade their peers to make cybersecurity a key part of the business program.
Research giant Gartner is out with a report documenting six emerging trends that IT security leaders should keep on their radar in 2018 and beyond. The findings could easily serve as pro tips for security leaders looking to gain a foothold in their organization’s decision-making process.
The FBI’s Internet Crime Complaint Center (IC3) has released its latest Internet Crime Report highlighting the most common attack avenues for bad actors, as well as some important statistics to keep in mind in 2018 and beyond.
Mere months after the NotPetya ransomware contagion, victims were already reporting more than $1 billion in damages across countries and verticals. And the costs associated with the attack are apparently still climbing.
As bad actors seek ever-more lucrative ways to enhance their Distributed Denial of Service (DDoS) attacks, analysts are noticing a sustained effort from the black hat community to amplify their firepower.
Employees are a company’s first line of defense against an impending breach. All it takes is one negligent staffer with bad password hygiene, or an unwary employee falling for a phishing scam, for hackers to gain a foothold in an organization’s infrastructure.
Reuters reported last week week that the ransomware attack suffered by the city of Atlanta in March was proving costlier than initially thought. City officials told the news agency that the strike continued to disrupt Atlanta’s “mission critical” applications even after its discovery, as the pestilence had not been fully contained.
The French National Commission on Informatics and Liberty (Commission Nationale de l'informatique et des libertés or CNIL) has issued a record fine to an optical center after the company failed to secure the personal (and in some cases highly sensitive) data of its customers.