Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Emergence of the Internet of Things and Other Issues are Raising Concerns about the Security of Wi-Fi Networks

Jun 08 by Bogdan Botezatu

Private and public Wi-Fi networks have become critical parts of the technology infrastructure of many organizations, particularly with the rise of mobile device users in the workplace. Many people rely on these networks to access the Internet, leverage corporate applications and data, and collaborate with their colleagues—among other uses.

Read More

Is It Cheaper to Pay for Cybersecurity Now, or to Pay Ransom to Criminals Later?

Jun 07 by Filip Truta

Breaching enterprise systems and holding their data hostage is a growing threat to organizations everywhere. Governments are fighting back by putting the onus on custodians to protect their data or face hefty fines. Even so, bad actors show no signs of backing off.

Read More

Three Ways DevOps Teams Can Step Up GitHub Security

Jun 06 by Ericka Chickowski

Last week the team behind Git, a platform that powers millions of the world's developer code repositories--including those on the wildly popular GitHub hosted service--released a crucial security update meant to keep developer environments safe. The patch was made to fix a flaw in how Git handles submodule repository configuration during cloning. It's a dangerous hole that could give attackers the power to create malicious Git repositories and leverage them to run arbitrary code execution on target developer machines.

Read More

Adding Enhanced Shields to Strengthen the Last Front: Encryption and Patch Management

Jun 05 by Razvan Muresan

(Article also available in German, French, Spanish, Italian, and Romanian.)

In an increasingly hostile landscape where large cyberattacks make headlines virtually every month, companies have started shifting their security defense paradigm toward gaining more visibility into the way attacks occur, and how they become targets.

Read More

How Can EDR Tools Help CISOs Increase Security Budgets

Jun 04 by Razvan Muresan

Companies provide detailed reports on previous and identified cyberattacks to their managers or board of directors every eight months on average, according to a recent survey of 1,050 chief information security officers in the US and Europe. 

Read More

Do Breaches Drive Biometrics Investment?

Jun 01 by George V. Hulme

What’s a leading indicator that an organization may invest in biometric authentication? It turns out that it’s a data breach.

Read More

Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

May 31 by Luana Pascu

A few years ago, companies were reluctant to adopt cloud computing because they thought a lack of physical access to the network would deprive them of control over their data. A major shift occurred when they understood that, with suitable configuration and security, cloud computing offers serious benefits.

Read More

The Unexpected Fallout of GDPR

May 30 by George V. Hulme

We’ve been writing quite a bit about GDPR (along with most everyone else), and its deadline rolling upon us there will be quite a bit more GDPR coverage to go around. But as the deadline draws closer, we’ve beginning to see some of the potential fallout and unexpected consequences of the regulation. Ridding

Read More

Machine Learning Might Just Save Your Business from a Breach

May 29 by Luana Pascu

Companies still struggle with ransomware, phishing, data breaches and other attacks that bypass their security and affect their budgets. Enterprises know they are in dire need of technology that will safeguard their infrastructures from known, unknown, and undisclosed vulnerabilities.

Read More

What You Need to Know About SamSam Ransomware. Hackers Paint Target on Healthcare

May 28 by Filip Truta

Ransomware remains the top threat faced by businesses as we move into the second half of 2018. Since the emergence of the first strains of ransomware in 2013, this nefarious trend has unfortunately only kept growing. And the latest such incidents have shown an increased focus on the healthcare sector.

Read More

Security Must Adjust as SDN Goes Mainstream

May 25 by Ericka Chickowski

After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on the cusp of big breakthroughs. So say the results of the new research from Enterprise Management Associates (EMA).

Read More

2018 Is the Worst Year for Corporate Security; Executives Lack Cohesive Security Plan

May 24 by Luana Pascu

Security executives fear cyberattacks will heavily target critical infrastructures in the near future, but they don’t seem to be doing much about enforcing security policies that also cover IoT devices. Despite the major threat they pose, connected devices have so far been overlooked in security policies. It appears that in general, in spite of the increasing awareness of high-profile cyberattacks and threats, enterprises tend to look the other way rather than invest properly in a cybersecurity strategy.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets