Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Top Inherent Risks with Cloud Security

Sep 09 by Bob Violino

The Cloud Security Alliance (CSA), an organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, recently unveiled its “Top Threats to Cloud Computing: The Egregious Eleven,” a report that examines the risks inherent with cloud security.

Read More

Moving to the Cloud? Be Ready to Embrace Complexity

Sep 03 by Bob Violino

The Cloud Security Alliance (CSA), an organization that works to raise awareness about best practices for secure cloud computing environments, has been especially busy of late—churning out findings related to cyber security and the cloud.

Read More

Every Hour SOCs Run, 15 Minutes Are Wasted on False Positives

Sep 02 by Ericka Chickowski

New research out in the past few weeks show that false positives and alert fatigue continue to plague security operations centers (SOCs) worldwide. And, according to the research, it's killing the SOC's ability to keep teams intact and to respond quickly to threats.

Read More

The Top Reason Businesses Make a Cyber Insurance Claim - Business Email Compromise

Aug 30 by Graham Cluley

AIG, one of the largest insurance companies in the world, has issued a report which reveals that there is a new leader in the list of top threats causing losses for businesses.

Read More

Financial Services: State of Software Security

Aug 29 by George V. Hulme

As we’ve recently covered, cybersecurity in financial services is having a challenging time keeping up with the rate of technological change. A survey conducted by the Ponemon Institute (on behalf of electronic design automation and software security company Synopsys) found that more than half of the financial services companies they surveyed suffered data breaches or system downtime due to attack.

Read More

The changing of the guard in the 2019 Gartner EPP MQ and why Bitdefender moved up

Gartner has once again included Bitdefender in the 2019 Magic Quadrant for Endpoint Protection Platforms1 for its GravityZone Ultra product. Bitdefender is proud to be one of the EPP vendors included in this report and believes our position is a testament to our innovation, execution, and commitment to endpoint security.

Read More

The Cloud Security Alliance’s Top Threats to Cloud Computing

Aug 26 by George V. Hulme

Periodically the Cloud Security Alliance publishes a report of the top threats to cloud computing. These reports hope to increase the awareness of risks to cloud computing. What’s interesting this year is that certain threats, including denial of service, shared technology vulnerabilities, and cloud service provider data loss and system vulnerabilities were ranked so low in a survey that they didn’t make the new report. They were all included in the Cloud Security Alliances previous report, the Treacherous 12.

Read More

How to Prepare for Data Breach Notifications under GDPR

Aug 22 by Filip Truta

The Ireland-based Data Protection Commission (DPC), the supervisory authority for the General Data Protection Regulation (GDPR), has released a guide to GDPR breach notifications to help controllers understand their obligations regarding notification and communication.

Read More

GAO: US Federal Agencies Need to Fully Establish Risk Management Programs

Aug 21 by George V. Hulme

There have been plenty — too many — breaches involving federal agencies over the years. Way back in 2006, a breach at the U.S. Department of Veterans Affairs affected 26.5 million people. In 2009, it was the National Archives and Records Administration that was hit and that breach affected 76 million. In one of the worst and most damaging breaches of all time, the U.S. Office of Personnel Management (OPM) affected 21.5 million federal employees and contractors, and breached the information included in security clearances, such as background investigation data and associated person data. Most recently, the U.S. Customs Agency fell victim to an attack and photos and other personal information collected by U.S. Customers and Border Patrol was leaked.

Read More

When it Comes to Application Security, Banks Pay Little Interest

Aug 16 by George V. Hulme

One might think financial institutions, such as banks, would have formidable levels of application security. Unfortunately, if one thought that, one would be wrong. According to an analysis by application security vendor ImmuniWeb, a startling 97 out of 100 of the world’s largest banks are vulnerable to web and mobile attacks.

Read More

How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2

Aug 14 by Bogdan Carlescu

This is the second of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers:

Read More

Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses

Aug 13 by Filip Truta

Legacy security designed to protect physical endpoints is no match for software-defined environments, such as cloud infrastructures. In fact, not even a modern endpoint security solution can, on its own, cover the full spectrum of cloud-workload protection requirements, use cases and workload types. This has opened the flood-gates to a new breed of cybersecurity solutions called “Cloud Workload Protection Platforms” (CWPPs), and the market is ripe for the picking, according to Gartner.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets