Serverless computing is taking off. By some estimates, many enterprises that are using public cloud have embraced serverless computing. As TheNewStack’s Lawrence Hecht wrote, “After digging in, we found that the survey says 70 percent of enterprises have migrated a significant number of workloads to the public cloud. Among this group, 39 percent of using serverless, 40 percent are using containers and 34 percent are using container orchestration.”
All about Virtualization and Cloud Security | Recent Articles:
The time for the healthcare industry to embrace cloud computing has been long. But it’s finally here, according to a recent survey conducted around HIMSS18 (Healthcare Information and Management Systems Society) of Members of the College of Healthcare Information Management Executives.
Software defined Networking is here, and there’s plenty of talk about what this means for security. As Ericka Chickowski wrote in Security Must Adjust as SDN Goes Mainstream we know one thing: security will need to continue to adjust to compensate.
That’s the conclusion of at least one cybersecurity services provider. According to Risk Based Security, following year over year increases in the number of publicly reported data breaches, the first three months of 2018 saw a respectable decline. But while the numbers look good, they may reflect a change in criminal targeting and goals and less an indication that cyber-criminals are waving white flags.
What’s a leading indicator that an organization may invest in biometric authentication? It turns out that it’s a data breach.
We’ve been writing quite a bit about GDPR (along with most everyone else), and its deadline rolling upon us there will be quite a bit more GDPR coverage to go around. But as the deadline draws closer, we’ve beginning to see some of the potential fallout and unexpected consequences of the regulation. Ridding
Despite Cloud Popularity, Enterprises Still Struggle with Compliance and Security
As we’ve covered in depth here over the past few years, enterprises have moved to cloud in a big way, with the estimated size of the cloud computing market to have been $130 billion globally in 2017. But those organizations who have made the move, especially when it involves sensitive or
It’s perhaps one of the most well-known and understood foundations of enterprise security – finding and patching outdated software with software updates. However, a newly released survey from cloud IT services provider ServiceNow, Today’s State of Vulnerability Response: Patch Work Demands Attention, found that there is still much work that must be done within the enterprise to close the window of vulnerability, that time between when an application vulnerability becomes known and it is remedied.
How much risk is hiding in your in the data in your enterprise?
Probably quite a bit.
Do you think automation and AI/machine learning will help your organization close its internal skills gap? A recent study from the Ponemon Institute found otherwise — at least for now. According to the Ponemon Institute study (funded by security vendor DomainTools) also found that the cybersecurity professional skills shortage will increase as automation technologies increase.
Delta, Sears Customer Data Breach Exposes Risks of Third Party Providers Once Again
Once again, a third-party vendor may have exposed sensitive credit card information of hundreds of thousands of Delta Air Lines and Sears. The attack shows the vulnerability to reputation and risk from attacks on third party vendors.
It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I know there’s a difference between machine language and AI, but so many use the terms interchangeably now that the difference is blurring in the minds of many.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (3)
- APT (2)
- artificial intelligence (1)
- biometrics authentication (1)
- breach (2)
- bug bounty (1)
- BYOD (28)
- CIO (7)
- CIOs (5)
- CISO (15)
- Cloud Security (117)
- connected care (1)
- container security (1)
- corporate hijacking (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber-attack (5)
- cybersecurity awareness (20)
- data breach (30)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (9)
- EDR (3)
- endpoint detection and response (1)
- Endpoint Protection & Management (15)
- Enterprise Security (420)
- Equifax (2)
- Events (4)
- financial services (15)
- garter (1)
- GDPR (14)
- GDPR, Data Protection (7)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (4)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (10)
- identity theft (4)
- Industries (32)
- insider threats (11)
- Integration (2)
- IoT (10)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (12)
- memory introspection (12)
- Microsoft (3)
- Network Protection (9)
- power grid (3)
- ransomware (7)
- ransomware, HVI (3)
- report (1)
- Security as a Service (15)
- Security Threats (57)
- SMB Security (41)
- Software-defined-datacenter (5)
- telecommunications (2)
- Virtualization & Data Center Security (69)
- vulnerability disclosure policy (1)
- WDATP (1)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2019 (14)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)