Threat intelligence enables enterprises to better understand, detect and respond to threats. To mount a successful defense, enterprises need to know their enemies and anticipate their next move. So far, the defenders have been losing.
All about Virtualization and Cloud Security | Recent Articles:
Google has admitted that some of its business customers of G Suite (formerly known as Google Apps) had their passwords stored on the company’s internal servers for 14 years in plaintext.
Believing that security incidents are imminent and probably unavoidable, enterprises are turning to advanced digital forensics to better understand and identify bad actors, and are open to using deception through technology such as honey pots or seeding fake data to help hunt down cybercriminals later, according to Neustar research. They’re also open to using deceptive tactics, such as deploying honey pots or seeding fake data to help hunt down cybercriminals later.
At Bitdefender, we understand the security challenges that organizations face in this ever-accelerating, hybrid, multi-cloud world. From small to very large, companies encounter common issues. We have been collaborating with Citrix to anticipate and address your cloud workload-protection challenges.
Bitdefender IntelliTriage, the new Network Traffic Security Analytics (NTSA) module, enables security operations to:
- Reduce security incident investigation and response time
- Focus efforts only on threats that represent a risk to the organization
- Lower the skill and resource requirements for threat hunting
Critical networks are caught in the crossfire of the battle over industrial secrets, tech patents, military operations and financial information. A month after the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint security advisory warning that a critical backdoor Trojan was in the wild, comes a new alert.
Ransomware drains billions from the global economy each year and shows no signs of slowing down. However, the highest cost of a ransomware attack is no longer the ransom itself. Today, the bulk of the financial damage consists of downtime, tarnished reputations and regulatory fines.
While hackers are often driven by financial gain through extortion schemes, state-sponsored criminal groups actively targeted the public administration sector for cyberespionage purposes in 2018. 16 percent of breaches occurred in public administration where “cyberespionage is rampant,” while 15 percent affected healthcare companies and 10 percent involved financial companies, Verizon found after analyzing more than 41,000 security incidents and confirmed data breaches in the US.
While the 400 year old John Donne poem, No Man is an Island, is about the interconnectedness of the individual to humanity, it could just as easily had been written about the nature of cybersecurity and modern technology.
New research shows that despite increasing fears around cyber threats, companies in the US and the UK are behind in implementing best practices and technology to lock down and protect passwords.
As budgets tighten it’s not uncommon for consumers and organisations alike to save a few pennies, and buy previously-used IT equipment and storage devices.
The very bodies that should set an example in protecting sensitive data are the same ones that are failing to comply with existing standards, new research indicates.