Cyber security pros often conceptualize a linear continuum of protection strategy: The left portion of the line represents security measures that tend to be more preventive of cyber threats, and the right portion represents more reactive approaches. In the early days of cyber security, it was believed that any shift to the right was a concession to the adversary. More recently, however, shifts right are often viewed as showing justified respect for the adversary.
All about Virtualization and Cloud Security | Recent Articles:
No one wants to go to the doctor’s office. Well, I guess some people do. I’m certainly not one of them. But imagine going to the doctor and then watching in horror as the medical equipment or computers the teams of doctors are working on aren’t working. That, suddenly, the come under attack just as you are “going under the knife.”
The cloud-based approach is growing in popularity among businesses worldwide, with more enterprises feeling confident in making the shift. Yet they feel obliged to take a different path due to concerns about data security in cloud computing, according to 24% of them, as well as limited budgets and high costs (22%), according to a recent survey from Netwrix.
- Bitdefender announces controlled availability release of GravityZone Sandbox Analyzer On-Premises
- Improves targeted attack detection across multiple vectors with enhanced data security and privacy
- Integrates with Bitdefender and third-party solutions for complex workflows and automated response
In only three days, businesses big and small with customers in the European Union have been told to cough up a cumulated €315 million in penalties after failing to comply with the GDPR rulebook.
The market for AI in cybersecurity is expected to soar. According to the market research firm Markets and Markets, sales and support of AI software and services will reach $38 billion by 2026 — up from nearly $9 billion this year.
A combination of outdated computer systems, lack of investment, and a deficit of skills and awareness in cyber security is placing NHS hospitals at risk, researchers have warned.
After Russians used techniques such as spearphishing emails and troll farms to inundate social media and influence the 2016 US election, concerns that the 2020 election is up for similar compromise are increasing. US intelligence and officials from the Democratic party are concerned that “Donald Trump and a powerful Senate ally are downplaying these concerns and not doing enough to thwart interfering,” according to The Guardian.
Nine in 10 IT security professionals say their companies can improve their reputations by better protecting data, according to a Bitdefender survey. CISOs and their teams also admit a weak posture could have the opposite effect, as seen in countless headlines in recent years that have sullied corporate images following security breaches.
A few weeks ago, the U.S. federal bureaucrats from the NASA Office of the Inspector General’s audit division put together a thorough document detailing the security woes at NASA Jet Propulsion Laboratory (JPL). The details come together in a classic “what not to do” anti-case study that many security professionals are probably familiar with at this point. It’s a good read for security people interested in learning from the mistakes of others.
Fines don’t stop rolling when Facebook is involved. Italy’s data protection watchdog, Il Garante per la protezione dei dati, has just hit the tech company with a €1 million fine for mishandling user data following the Cambridge Analytica scandal, writes TechCrunch.
Preventative security technologies like firewalls and application blacklisting aren’t always enough to safeguard an organization’s IT infrastructure. Businesses often face internal threats, so a cybersecurity strategy must include tools and processes for rapid detection and response. However, strategies often don’t.