As Bogdan Botezatu wrote in his post Here Come Software-Defined Data Centers - What are the Security Implications? — the software defined data center is here to stay and is expected to grow from $25.61 billion in 2016 to $83.21 billion by 2021, at nearly a growth rate of about 30% annually.
All about Virtualization and Cloud Security | Recent Articles:
We’ve been starting to write more about the software-defined data center here at Business Insights because it’s become clear this is where enterprise networks are quickly moving. While software-defined networking gets all of the headlines — Network Functions Virtualization (NFV) is a big part of the software-defined data center.
A vital, actually a most fundamental, aspect of enterprise security is helping organizations to keep confidential information confidential. This is why security at the data and document level is something to which much more attention should be paid by enterprises.
The hits to the healthcare industry keep on coming. While the number of overall data breaches tracked by the Identity Theft Resource Center (ITRC) hit a record in 2016, with 1,093, which is a 40 percent increase over the previous record in 2015 of 780 breaches – It’s healthcare that continues to grow the most.
When it comes to the business of information security, and the big technology trends that will likely shape the year ahead, the RSA Conference is perhaps the most important event of the year. And with a record attendance of more than 43,000, this year was no exception.
When it comes to shadow IT, government can face just as much of a challenge as the typical enterprise. Last week, the Office of Inspector General (OIG) for the General Services Administration (GSA) published a report which found that GSA’s Office of 18F had “routinely disregarded and circumvented fundamental security policies and guidelines.”
Last year was a record year when it came to attendance for the RSA Conference. More than 40,000 attendees arrived at the Moscone Center to learn about and discuss the latest in cybersecurity trends ranging from cybersecurity big data analytics, application security, to forensics and incident response and everything in-between.
It turns out that story about guests being locked out of, and locked into, their hotel rooms in a four-star hotel in Austria aren’t exactly accurate. According to this story in The Verge, Don’t believe the story about hackers locking guests in their rooms at a luxury hotel while what happened is still very interesting, and of concern to any traveler, what was reported wasn’t entirely accurate.
Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here.
Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while we experienced the traditional breaches this year—data theft for fraud, identity theft, and financial gain—many of the most significant breaches this year were not financially motivated, but political or activist in nature.
The U.S. Government has taken steps it hopes will better protect the users of medical devices, such as pacemakers and insulin pumps, from cyberattacks. For years now the risks of connected medical devices have been demonstrated and well-known. It’s an area we’ve covered here for some time.
There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.