Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

U.S. Cybersecurity Sector Cries for Help as Demand for Talent Soars

Nov 12 by Filip Truta

Employer demand for cybersecurity professionals across the United States continues to soar, according to data sourced by Burning Glass Technologies. While the U.S. is home to hundreds of thousands of cybersecurity workers, plenty of seats are still vacant in IT departments across the nation.

Read More

Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities

Nov 09 by Ericka Chickowski

As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are increasingly pushing cloud security to the top of the cybersecurity budgetary priority list. 

Read More

Non-EU Countries Work Hard to Comply with GDPR Even Though They Don’t Have to

Nov 08 by Filip Truta

In 2017, when the European Parliament announced plans to make the General Data Protection Regulation a reality, organizations sitting on large troves of customer data immediately took notice. They weren’t as quick, though, to take action to meet the regulation’s actual requirements.

Read More

37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says

Nov 07 by Luana Pascu

While industry reports claim ransomware attacks have dropped, cybersecurity insurance company Beazley Breach Response (BBR) Services has reported otherwise. According to businesses benefiting from its insurance deals, there has been a surge in the number of reported ransomware attacks, especially in September, when incidents nearly doubled from a month earlier.

Read More

Join Us at .NEXT London to Discuss Survival in HCI

“Survival” is usually associated with stoically pushing on through harsh conditions, symbolized by people like this year’s Nutanix .NEXT keynote speakers -- Bear Grylls and Jane Goodall. But, as technology weaves ever more tightly into our daily lives to support mobility and improve life quality, the term “survival” is also starting to denote the ability to withstand a cyberattack. Bruce Schneider nails it in his security talks – if in the past, a cyberattack could crash your spreadsheet, today, it could crash your car.

Read More

Old Malware on USB Drives Still Pose Potent Threat to Industrial Facilities, Research Shows

Nov 06 by Filip Truta

Technology players know all too well the implications of having malware moving around on USB drives. A single autorun Trojan or ransomware strain can inflict massive disruption and loss of revenue, as cybercrooks increasingly take aim at big business. That’s why companies like IBM prefer to play it safe and ban the use of removable storage in their infrastructures altogether.

Read More

Almost Half of Organizations Have No Security Operation Center, Hindering Detection of Advanced Threats

Nov 05 by Razvan Muresan

Even though Security Operation Centers (SOCs) are increasingly common, some 48 percent of organizations don’t have one, a recent survey shows. This creates many security challenges, such as: slower identification of intrusions, ad-hoc or no processes following a security breach, inability to efficiently protect the most valuable assets from advanced attacks, and delayed isolation of corrupted infrastructures.

Read More

DevSecOps: More Work Ahead

Nov 02 by George V. Hulme

DevOps has come a long way since it got underway in full force nearly ten years ago.  As was recently made clear at this year’s DevOps Enterprise Summit (DOES) in Las Vegas, DevOps organizations have been successful when it comes to knocking down organizational silos, optimizing the delivery of software services and functionality, and shortening the time it takes to deliver digital value to customers. DevOps organizations are delivering better business outcomes.

Read More

High Churn Rate in Healthcare May Help Explain Sector’s Vulnerability to Phishing, Research Suggests

Nov 01 by Filip Truta

Healthcare lags behind most other industries in recognizing and reporting phishing attacks, new research shows. The resilience of healthcare providers to phishing emails is much lower than in other verticals, while its high turnover rate might have something to do with it.

Read More

AI Helps Enterprises Conquer IT Speed and Complexity

Oct 31 by George V. Hulme

While many had hoped that along with the rise of cloud computing would come a more simple era of enterprise computing. In some ways, it has. With software as a service enterprise no longer have to contend with managing the infrastructure to support so many applications. With infrastructure as a service enterprises can cut the amount of infrastructure they must manage. It’s reduced the amount of infrastructure and applications that must be directly protected, patched, and maintained. But the era of more simple computing never arose.

Read More

82% of IT Execs Fear Criminals Will Soon Adopt Machine Learning to Create More Advanced Threats

Oct 30 by Luana Pascu

Artificial intelligence and machine learning are extensively used in cyber defense, but what happens if they backfire and hackers use these technologies for crime? As they concentrate on the capabilities and benefits it can bring to everyday lives, companies have not really focused on how cybercriminals can use AI to create even more advanced and sophisticated threats.

Read More

Healthcare.gov Detects Significant Breach On Enrollment Exchanges

Oct 26 by George V. Hulme

The Center for Medicare and Medicaid Services (CMS) announced that it has detected anomalous activity in its Federally Facilitated Exchanges (FFEs) Direct Enrollment pathway for agents and brokers. This is the system that enables agents and brokers to help consumers with their coverage applications to the FFEs. One can imagine the type and quantity of sensitive information shared on these systems.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets