Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

CISOs require infrastructure-agnostic security and visibility to support data center modernization, survey shows

Dec 26 by Razvan Muresan

Conventional endpoint security solutions - originally designed for hardware-defined, premise-based infrastructure - are unsuitable for the modern data center. As a result, 58.4% of IT execs say that the lack of infrastructure-agnostic security is the main challenge in the data center transformation process.

Read More

Financial services industry among top targets of cyberattacks

Dec 21 by Luana Pascu

In 2017, global spending on cybersecurity totaled about $86.4 billion, while in 2018 businesses will reportedly spend $93 billion, according to estimations from Gartner.

Read More

Major hacks in 2017 and what enterprises can expect from the threat landscape in 2018

Dec 20 by Luana Pascu

Each December, security researchers make predictions for the following year, and they always seems to sound the same: attacks will increase, malware will be more sophisticated because hackers are upping their game, so IT executives must secure their infrastructure or else. So what can enterprises expect from the threat landscape in 2018?

Read More

Connected care industry seen growing to €6 billion by 2022; GDPR to bring challenges

Dec 19 by Luana Pascu

We’re on the verge of a complete transformation of healthcare, as traditional telecare is about to be dethroned by connected care, according to a research report from Berg Insight. As telecare applications and devices collect and store large amounts of data concerning patients’ health, physical location and daily movement, companies in this segment will have to deal with the challenges of the General Data Protection Regulation (GDPR).

Read More

Bitdefender Joins Xen Project Advisory Board

Dec 18 by Liviu Arsene

Bitdefender has been named an Advisory Board member for the Linux Foundation-hosted Xen Project formed of major cloud companies, virtualization providers, enterprises and silicon vendors that advise and support development of Xen Project software for cloud computing, embedded, IoT use-cases, automotive and security applications.

Read More

Limitations of Machine Learning algorithms in malware detection

Dec 18 by Luana Pascu

There’s been a continuous increase in the use of Machine Learning but, despite the recent hype, the technology is not new. While researchers have been playing with artificial neural networks from as early as the 1950s, machine learning is not new even in the context of cybersecurity.

Read More

When it Comes to Security and the Public Cloud, Organizations Still Have Lots to be Concerned About

Dec 12 by Razvan Muresan

Fears about the security and privacy of data stored in the cloud seem to have decreased somewhat over the years, perhaps because organizations have become more comfortable with the idea of entrusting service providers with their digital assets.

Read More

Security and performance required to support data center transformation, survey shows

Dec 11 by Razvan Muresan

A new Bitdefender survey reveals that security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a prime concern.

Read More

Predictions for 2018: zero-day exploits leaked from security agencies, next-level ransomware

Dec 08 by Bogdan Botezatu

As 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the upcoming malware developments that will likely emerge in the year to come. Bitdefender experts predict an increase of zero-day exploits leaked from security agencies the world over, and massive changes to the way ransomware operates.

Read More

Ransomware, Digital Currency Miners dominate the threat landscape in 2017, Bitdefender study shows

Dec 06 by Bogdan Botezatu

The past few months have spurred a dramatic reshaping of the threat landscape. Traditional threats such as generic Trojans, ransomware and spam bots have been massively complemented by data destructors. Powered by military-grade code allegedly leaked from the NSA, both WannaCry and GoldenEye wrought havoc throughout Q2 and Q3, shutting down businesses and causing unprecedented operating losses.

Read More

Cities Would Be Smart to Deploy Strong Cyber Security Measures as They Build More Connected Infrastructures

Dec 04 by Razvan Muresan

We’re hearing more and more about smart cities, as the Internet of Things, artificial intelligence, sensors, higher bandwidth, and other technology advancements make it more feasible to modernize population centers.

Read More

Cloud computing and the amplified insider threat

Dec 01 by George V. Hulme

When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets