Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Half of Businesses Have Yet to Take Control of Password Security; Technology Sector Leads the Pack

Oct 03 by Filip Truta

An enterprise’s first line of defense, experts agree, is the employee. And the first factor of enterprise authentication is the password. It takes a single untrained pair of eyes to fall for a phishing scam to let hackers into an infrastructure.

Read More

Seven Signs of a Strong Security Culture

Oct 02 by Ericka Chickowski

The importance of a strong enterprise cybersecurity culture to the overall effectiveness of an IT security department can't be understated. It's consistently named by executives as a crucial, if ephemeral, ingredient for cyber risk management success.

Read More

Machine Learning Helps IT and Security Leaders Stay Ahead of Cyber Threats

Oct 01 by Razvan Muresan

Cyber security executives are always looking for ways to keep a step ahead of the bad actors and the latest threats. Emerging technologies such as machine learning (ML) are providing a way to do that, and some IT and security leaders have begun taking advantage of tools that leverage these automated capabilities.

Read More

Cloud Security Budgets Increase Substantially in 2018 as CISOs Recognize the Dangers Out There

Sep 28 by Filip Truta

Cloud security has finally become a big-enough blip on IT professionals’ radar to be taken seriously. Almost all respondents in a recent cybersecurity study revealed that their organization has agreed to increase the resources allocated to protecting the company’s assets from bad actors – and to great extent, too.

Read More

How GDPR Is Prompting Renovation of Data Protection Practices Worldwide

Sep 27 by Filip Truta

The General Data Protection Regulation, which took effect in May, has renewed interest in security spending. Gartner projects it will drive 65 percent of buying decisions related to data loss prevention by the end of the year. The focus of the regulation, known commonly as GDPR, is on citizens in the European Union. But its impact is becoming global.

Read More

Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution

Sep 26 by Liviu Arsene

The increase in cloud adoption has significantly impacted the way organizations think about security, in the sense that threat visibility into infrastructures has become mandatory in light of how the threat landscape has evolved. Starting from the premise that threat actors can and will breach infrastructures, organizations need to begin focusing on detecting and responding to these breaches as swiftly as possible to restore affected environments, ensure business continuity, and stay compliant with new regulations.

Read More

Why Artificial Intelligence Is Key to Combating New and Advanced Threats

Sep 26 by Filip Truta

Cybersecurity is often likened to a cat-and-mouse game, with Jerry a step or two ahead of Tom as the rodent gets up to mischief. That’s because cybersecurity is a cat-and-mouse game. Hackers almost always have the advantage of surprise, while IT departments are left picking up the broken pieces should their defenses fail.

Read More

As Bots and Robotic Processes Rise in the Enterprise, so Do Security Risks

Sep 25 by George V. Hulme

As business-technology systems grow more complex, so does the need to automate essential management and security processes. With hybrid cloud architectures, DevOps management approaches, and continuous software delivery pipelines, organizations need to automate as many processes as they can automate. For those tasks that require little or no deviation, many enterprises are turning to Robotic Process Automation (RPA).

Read More

Cryptojacking Uncrowns Ransomware as Major Threat for Healthcare Industry

Sep 24 by Luana Pascu

The healthcare industry is among the top targets of cyberattacks, especially since the internet of things found its way into the industry and completely revolutionized it. After healthcare’s share of ransomware attacks in 2017, and a great deal of data theft, phishing and more ransomware in 2018, cybercriminals gradually switched methods, tapping into the cryptojacking space.

Read More

How Businesses Risk Everything by Relying on Staff to Keep Ransomware Out

Sep 21 by Filip Truta

Sophisticated malicious emails continue to creep into every inbox, every day. Yet many employees still don’t know enough to spot an unsecure website, and 13 percent of them click on URLs that could hide malware. And, while experts recommend training staff to sniff out phishing campaigns and other cyber threats, they also advise not to rely on staff to keep hackers out.

Read More

Amazon Hit from Within, Employees Leak Proprietary Data for Profit

Sep 20 by Luana Pascu

Insider threats are nothing to joke about -- they are a real danger to companies worldwide, who often neglect them. In fact, they rank among the top six threats of 2018, according to statistics. A company will spend at least $8 million yearly on insider threats, the Ponemon Institute has found.

Read More

Your Business Should Be More Afraid of Phishing than Malware

Sep 19 by Graham Cluley

The headlines love to talk about sophisticated hacking gangs, exploiting zero-day vulnerabilities to break their way into businesses and steal corporate data.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets