The global public cloud services market is expected to grow by 18 percent in 2017 comparted to 2016, totaling $246.8 billion this year, from $209.2 billion last year, according to Gartner.
All about Virtualization and Cloud Security | Recent Articles:
This year’s leading security conference, RSA, takes place February 13-17 in San Francisco, California, where the world’s best security researchers will present the findings of their latest research against cybercrime.
From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.
A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities has been found by security researchers, potentially used to carry code injection attacks that would go completely unnoticed by traditional security software.
Note: This article was developed in collaboration with Marc Trouard-Riolle, Principal Product Marketing Manager, Citrix Systems Inc.
With cybercrime shifting from user-targeted attacks to organization-targeted attacks, it stands to reason that the sophistication of their tools and malicious code has also increased. Employing advanced evasion and persistence techniques to infiltrate and compromise an organization, their goal has remained constant: to make money.
With the worldwide security market reaching $22.1 billion in 2015 in terms of revenue, Garner estimates that it increased by 3.7 percent as compared to 2014. While the figures for 2016 are yet to surface, it’s safe to estimate these numbers will surely rise, especially in light of recent cyberattacks and global security awareness.
The proliferation of IoT devices for both consumers and business has opened up a new market that’s estimated to reach a whopping $661.74 billion by 2021, from $157.05 billion in 2016. Considering the obvious business opportunities, security researchers have expressed concerns regarding the security mechanisms – or lack of – bundled with “smart things”.
The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.
Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.
IoT adoption has been predicted to increase 50 percent in 2016, although it widely varies by industry. While some industries, such as utilities, oil and gas, and manufacturing, are highly responsive in terms of adoption, others don’t even have a plan to implement IoT, Gartner estimates.
Since nothing that’s being executed in raw memory is encrypted – just scrambled – APTs that try to execute malicious code on a machine will be intercepted by HVI long before they actually compromise the operating system. In fact, as soon as the malicious code, even delivered via zero-day exploit, tries to execute in the VMs memory, the introspection engine will immediately “see” the malicious action and the code that was trying to be executed.