Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

How patented machine-learning boosts ransomware detection and prevents businesses from being encrypted

Jan 12 by Razvan Muresan

Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads.

Read More

Browser-Based Attack Proliferation Calls for New Security Approach

Jan 10 by Harish Agastya

With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.

Read More

Fight off Advanced Persistent Threats with Bitdefender Hypervisor Introspection at Citrix Summit 2017

Jan 09 by Bogdan Botezatu

Cybercrime is estimated to cost $6 trillion by 2021, while spending on cybersecurity solutions to safeguard infrastructure is forecast to surpass $1 trillion. Growing security challenges due to system vulnerabilities and misconfigurations turn over 1 million people into cybercrime victims every day.

Read More

The Five Most Noteworthy Breaches of 2016

Jan 05 by George V. Hulme

Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while we experienced  the traditional breaches this year—data theft for fraud, identity theft, and financial gain—many of the most significant breaches this year were not financially motivated, but political or activist in nature.

Read More

FDA Prescribes Safer Path for Connected Medical Devices

Jan 04 by George V. Hulme

The U.S. Government has taken steps it hopes will better protect the users of medical devices, such as pacemakers and insulin pumps, from cyberattacks. For years now the risks of connected medical devices have been demonstrated and well-known. It’s an area we’ve covered here for some time.  

Read More

Bug Bounty Programs: Significant Benefits, Challenges

Jan 03 by George V. Hulme

There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.

Read More

DDoS Attacks on the Rise—Here’s What Companies Need to Do

Dec 28 by Razvan Muresan

Distributed denial-of-service (DDoS) attacks have been going on for years. But in recent months they seem to have gained much more attention, in part because of high-profile incidents that affected millions of users.

Read More

Most companies have suffered a recent significant cybersecurity incident

Dec 21 by Razvan Muresan

Some 57% of CIO/CISOs surveyed by the consultancy firm EY have experienced a recent significant cybersecurity incident, proving that more work is needed to strengthen the corporate shield.

Read More

IT security budget may be misleading indicator of security, Gartner says

Dec 19 by Razvan Muresan

IT security spending ranges from about 1 percent to 13 percent of the IT budget, according to the most recent IT Key Metrics Data from Gartner. But spending can be a misleading indicator of program effectiveness, analysts say.

Read More

Machine-learning fuels Bitdefender’s intellectual property program, boosting the number of patents

Dec 15 by Razvan Muresan

“Nowadays, if you stand still you won’t be able to keep your edge in the market or wherever you currently are,” says Florin Talpes, Bitdefender’s CEO and founder. “You have to be restless, in a good way. The moment you start looking for solutions and start to deepen and brush up these solutions, that’s where innovation is born.”

Read More

Federal Agencies Need to Step Up Cyber Security Efforts

Dec 14 by Bogdan Botezatu

People often complain about how the government spends money inefficiently—and in many cases these criticisms are justified. And when it comes to spending on cyber security solutions, there’s plenty of room for improvement, according to a recent study.

Read More

Don’t let your former IT staff sabotage your company

Dec 13 by Graham Cluley

A recent news story has brought to mind a threat which probably sends a shiver down the spine of many system administrators.

Read More