Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

How Bitdefender's Cybersecurity Predictions for 2020 Can Keep Companies Safe

Jan 06 by Silviu Stahie

Companies are always in the crosshairs of threat actors, but how do you prepare if you don’t know how your business could be affected. Fortunately, Bitdefender's Cybersecurity Predictions for 2020 offer a framework for the essential security pillars of any company.

Read More

A Third of Infosec Pros Believe They’re under Cyber-Attack but Don’t Know Yet

Jan 06 by Filip Truta

If security incidents in the past few years are any indication, cybersecurity professionals face a bumpy road ahead. While some IT security chiefs are prepared to hang up their boots, many are almost certain their organization is under attack from hackers but they haven’t yet learned of it.

Read More

Pair of Data Breaches Top Off the Year in Healthcare Security

Jan 03 by George V. Hulme

Canada-based LifeLabs notified 15 million patients on December 17 that their personal information relating to healthcare, including name, address, email, login, passwords, date of birth, healthcare number, and lab test results, may have been accessed without authorization. Most of those affected reside within British Columbia and Ontario.

Read More

Half of CISOs Might Quit Their Jobs in 2020 if Budgets, Cybersecurity Staff Remain Tight [Bitdefender Study]

Dec 30 by Filip Truta

Organizational weak spots and stressors are taking their toll on IT security professionals. 72% of infosec professionals agree that the lack of proper security tools and knowledge are huge obstacles preventing rapid incident detection and response. Furthermore, more than half of C-suite security pros are considering leaving their job if things don’t change in 2020 and beyond.

Read More

Security Pros Don’t Protect Keys and Certificates as Effectively as Usernames and Passwords

Dec 27 by Filip Truta

A study comparing security controls for human and machine identities reveals a worrying trend. While almost all organizations have a policy that governs password length for human identities, only half have a written policy on length and randomness of keys for machine identities - this, despite the rapid spread of machines that need to authenticate themselves to each other so they can communicate securely.

Read More

Data security, privacy are big hurdles in front of successful digital transformation

Dec 26 by George V. Hulme

Healthcare organizations are doing everything they can to modernize and digitally transform their organizations, but by many accounts, healthcare remains a laggard when it comes to digitization. And as a recent PwC report reads, “The question for 2020 will be whether this digital transformation will benefit consumers—marking a new dawn for the US health industry and for the people whose lives depend on it.”

Read More

60% of Records Leaked in Past Year Exposed by Financial Services Firms

Dec 24 by Filip Truta

Financial services firms accounted for 6% of all data breaches in 2019 but more than 60% of leaked records, partly due to the Capital One mega breach that compromised more than 100 million records, according to a new study.

Read More

CISOs Are Skeptical About Cybersecurity Vendor Claims, Study Shows

Dec 23 by Filip Truta

Most Enterprise IT pros believe cybersecurity vendors use ambiguous data, and sometimes even resort to lies to peddle their products, according to a new survey.

Read More

Healthcare Security: How To Deploy IoT Securely

Dec 20 by George V. Hulme

The healthcare internet of things (IoT) market is expected to reach 543 billion by 2025 — at an annual growth rate of roughly 20%, according to a report from Grand View Research. Research firm Gartner pegs healthcare IoT growth in 2020 at 29%.

Read More

Seven Toxic Information Security Personalities

Dec 19 by George V. Hulme

There are many challenges to getting a cybersecurity program right. The right technology must be deployed, managed, and tuned just right, CISOs and security managers must be able to get the necessary executive support and budget to execute on their plans, and their plans have to be well crafted. Not to forget that nearly everyone in the organization has to be security conscious and savvy, or nearly any organization is one phishing-attack click away from compromise.

Read More

The Four Best Cybersecurity Resolutions for Small Businesses in 2020

“In 2019, 43% of breach victims were small businesses.” (Verizon)

The New Year should not only be a time for personal improvement, goal setting and reflection. It's also the perfect time to focus on the past, present and future of your small business. With the increase in cyber-attacks on vulnerable small businesses, 2020 is the year to protect your organization and your customers from preventable threats.

Read More

A Perfect AV-Comparatives Detection score: What does it mean?

Dec 18 by Bogdan Carlescu

With an ever-changing Cybersecurity Industry and a growing number or security solutions, it becomes harder and harder for an organization to decide which should be the solution of choice to protect its digital assets. As it is nearly impossible or at least impractical for a security buyer to test all the security solutions, the industry tests are a critical benchmark that help organizations decide.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets