Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

Jan 15 by Silviu Stahie
  • IoT manufacturers often favor speed of rollout over security
  • Attackers don’t have to work too hard to compromise smart devices
  • It’s up to users and ISPs to protect homes and network infrastructure
Read More

Pandemic’s Impact on Cyber Security is Far Reaching

Jan 14 by Bob Violino
  • An overwhelming majority of business and technology executives worldwide plan to shift their cyber security strategies due to the pandemic, according to a new study.
  • One of the most prominent trends has been an accelerated push to digital transformation, and this has had a big impact on cyber security.
  • The role of the CISO has never been more critical to organizations’ survival and growth.
Read More

Three Security Headaches in 2021 and the Technologies to Fix Them

Jan 06 by Filip Truta
  • Remote workers have become lucrative ground for lurking cybercriminals
  • Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages
  • IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit
  • The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation
  • Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures
Read More

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

Jan 05 by Filip Truta
  • 80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans
  • IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern
  • Digitally mature organizations stand out in their frequency of performing technology audit risk assessments
  • 67% of organizations do not classify themselves as digital leaders
  • ‘Cyber breaches’ are consistently a primary concern across key industry sectors
Read More

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Jan 04 by Bob Violino
  • Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report.
  • Five key factors are influencing the cyber threat landscape.
  • By taking certain steps, organizations can build a more security and agile environment.
Read More

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

Common IoT Threats and the Role of ISPs in Protecting Our Homes

Dec 30 by Silviu Stahie
  • To fix a problem you first need to know of its existence
  • IoT devices are often the target of malware botnets and campaigns
  • ISPs need to deal with IoT security from a much broader perspective
Read More

Most Companies in US and Canada Gather User Data through Third-Party Code without Telling Customers, Survey Finds

Dec 29 by Silviu Stahie
  • Advertisers usually use gathered data to better target customers
  • Most companies allow some sort of user tracking
  • The more money companies makes from ad revenue, the laxer the rules governing data gathering
Read More

ICO Calls on UK Businesses to Ensure Lawful Flow of Data Under GDPR as Brexit Transition Period Ends

Dec 28 by Filip Truta
  • SMEs must check whether they are impacted before the end of the UK’s transition period with the EU
  • Watchdog offers guidance and resources on the actions they may need to take if they use personal data
  • Update offers a reminder of what personally identifiable information (PII) is and how it’s classified
Read More

Most Employees Think It’s the Company’s Job to Secure Their Work Accounts

Dec 25 by Filip Truta
  • 59% of employed Americans are more concerned about creating a strong password for personal accounts than work accounts
  • 70% of remote workers don’t consider it their responsibility to keep their corporate account secure
  • Organizations are behind in educating their employees on the risks associated with a compromised corporate account
  • Human Risk Analytics enables IT admins to stay afloat of insider threats
Read More

Organizations Relied More in 2020 on Crowdsourced Cybersecurity, Report Finds

Dec 24 by Silviu Stahie
  • Companies need bug bounty platforms now more than ever
  • The increase in the number of threats in 2020 pushed companies to secure their products better
  • Human error is a main source of cyber risk
Read More

Poor Security Habits Might Force Companies to Bring Employees Back to the Office

Dec 23 by Filip Truta
  • 69% admit to using corporate devices for personal use
  • 57% say they allow other members of their household to use their corporate devices for schoolwork, gaming and shopping
  • 82% admit to reusing passwords
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets