Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

Jul 03 by Silviu Stahie

The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an advisory for companies regarding the detection and mitigation of malicious traffic coming from Tor (The Onion Router.) 

Read More

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

Jul 02 by Ericka Chickowski

Recent studies show that the modern SOC has evolved to become the lynchpin for most enterprise security strategies. Organizations spend a significant chunk of their security budget on SOC operations and many depend upon the SOC to help them detect and hunt for threats, respond to incidents, and maintain visibility into the organization's cyber risk posture. However, SOC effectiveness still varies greatly from organization to organization.

Read More

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

Jul 02 by Filip Truta

Given enough time, employees – especially those working remotely – will click on a link to a potentially dangerous website. But how much time? According to recent data, less than an hour.

Read More

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

Jul 01 by Silviu Stahie

DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, according to a report from Nexusguard that reveals a 278% increase in DDoS attacks compared to Q1 2019. 

Read More

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

Jul 01 by Filip Truta

New data shows a sharp increase in monthly business email compromise (BEC) attacks focused on invoice or payment fraud.

Read More

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

Jun 30 by Alina Bizga

A new report published by KnowBe4 delves into the top security challenges and issues that IT professionals and UK-based organizations face, including attack types, security initiatives and organizational limits.

Read More

Security Professionals Say COVID-19 Crisis Increased Cyber Threat to Enterprise Systems

Jun 30 by Silviu Stahie

A survey of some of the top IT security professionals who participated in the annual Black Hat USA conference underlined a key concern, with companies overwhelmingly believing that the COVID-19 pandemic increases cyberthreats. 

Read More

Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts

Jun 30 by George V. Hulme

As enterprises continue with their digital transformations by automating their manual workflows, moving existing applications to the cloud, and developing and deploying new applications at a record pace, they’re also rapidly increasing the complexity in their environments, and as a result security controls and processes that should be in place continue to slip.

Read More

World Economic Forum Outlines Core Principles for Businesses Seeking to Reduce Cyber Risk

Jun 29 by Filip Truta

An optimistic new report by the World Economic Forum predicts businesses will prioritize security in a bid to ensure longer-term success. The reason? A rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19.

Read More

The Security of Legacy Devices Should Not Be the Bane of ISPs

Jun 26 by Silviu Stahie

The Internet of Things (IoT) ecosystems may be populated by all the latest and innovative devices, but it's also home to legacy devices, which in many cases, are points of entry for adept hackers looking for a way into the infrastructure.

Read More

IT Departments May Be Helping Bad Actors with New Apps for Untrained Staff, New Research Shows

Jun 25 by Filip Truta

Rapid changes to how businesses operate offer excellent opportunities for malicious actors to access corporate networks. Infosec professionals report that phishing and whaling attacks taking advantage of unwary employees have risen during the pandemic. At the same time, IT departments are deploying new technologies to support remote work without consulting those on the receiving end, potentially fueling bad actors’ malicious campaigns against businesses.

Read More

SOC Teams Care Too Much About Detecting Cyberthreats and Not Enough About MTTD

Jun 24 by Silviu Stahie

The self-assessed effectiveness of corporate security operations centers (SOCs) seems to be overestimated by the people working in those positions, a new study from Exabeam revealed. 

Read More

Cloud Security

Subscribe to Blog Updates

Posts by Categories

Latest Tweets