Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Could It Be So? Data Breaches Decline in 2018?

Jun 12 by George V. Hulme

That’s the conclusion of at least one cybersecurity services provider. According to Risk Based Security, following year over year increases in the number of publicly reported data breaches, the first three months of 2018 saw a respectable decline. But while the numbers look good, they may reflect a change in criminal targeting and goals and less an indication that cyber-criminals are waving white flags.

Read More

CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says

Jun 11 by Filip Truta

Once a paltry segment of enterprise IT, security has become a crucial factor in the success of an organization. This paradigm shift, driven by growing legions of bad actors and new regulations, have cast the spotlight on IT security leaders like never before. This, Gartner analysts calculate, creates an unprecedented opportunity for CIOs and CISOs to prove their value and – why not? – forge new career paths.

Read More

Emergence of the Internet of Things and Other Issues are Raising Concerns about the Security of Wi-Fi Networks

Jun 08 by Bogdan Botezatu

Private and public Wi-Fi networks have become critical parts of the technology infrastructure of many organizations, particularly with the rise of mobile device users in the workplace. Many people rely on these networks to access the Internet, leverage corporate applications and data, and collaborate with their colleagues—among other uses.

Read More

Is It Cheaper to Pay for Cybersecurity Now, or to Pay Ransom to Criminals Later?

Jun 07 by Filip Truta

Breaching enterprise systems and holding their data hostage is a growing threat to organizations everywhere. Governments are fighting back by putting the onus on custodians to protect their data or face hefty fines. Even so, bad actors show no signs of backing off.

Read More

Three Ways DevOps Teams Can Step Up GitHub Security

Jun 06 by Ericka Chickowski

Last week the team behind Git, a platform that powers millions of the world's developer code repositories--including those on the wildly popular GitHub hosted service--released a crucial security update meant to keep developer environments safe. The patch was made to fix a flaw in how Git handles submodule repository configuration during cloning. It's a dangerous hole that could give attackers the power to create malicious Git repositories and leverage them to run arbitrary code execution on target developer machines.

Read More

Adding Enhanced Shields to Strengthen the Last Front: Encryption and Patch Management

Jun 05 by Razvan Muresan

(Article also available in German, French, Spanish, Italian, and Romanian.)

In an increasingly hostile landscape where large cyberattacks make headlines virtually every month, companies have started shifting their security defense paradigm toward gaining more visibility into the way attacks occur, and how they become targets.

Read More

How Can EDR Tools Help CISOs Increase Security Budgets

Jun 04 by Razvan Muresan

Companies provide detailed reports on previous and identified cyberattacks to their managers or board of directors every eight months on average, according to a recent survey of 1,050 chief information security officers in the US and Europe. 

Read More

Do Breaches Drive Biometrics Investment?

Jun 01 by George V. Hulme

What’s a leading indicator that an organization may invest in biometric authentication? It turns out that it’s a data breach.

Read More

Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

May 31 by Luana Pascu

A few years ago, companies were reluctant to adopt cloud computing because they thought a lack of physical access to the network would deprive them of control over their data. A major shift occurred when they understood that, with suitable configuration and security, cloud computing offers serious benefits.

Read More

The Unexpected Fallout of GDPR

May 30 by George V. Hulme

We’ve been writing quite a bit about GDPR (along with most everyone else), and its deadline rolling upon us there will be quite a bit more GDPR coverage to go around. But as the deadline draws closer, we’ve beginning to see some of the potential fallout and unexpected consequences of the regulation. Ridding

Read More

Machine Learning Might Just Save Your Business from a Breach

May 29 by Luana Pascu

Companies still struggle with ransomware, phishing, data breaches and other attacks that bypass their security and affect their budgets. Enterprises know they are in dire need of technology that will safeguard their infrastructures from known, unknown, and undisclosed vulnerabilities.

Read More

What You Need to Know About SamSam Ransomware. Hackers Paint Target on Healthcare

May 28 by Filip Truta

Ransomware remains the top threat faced by businesses as we move into the second half of 2018. Since the emergence of the first strains of ransomware in 2013, this nefarious trend has unfortunately only kept growing. And the latest such incidents have shown an increased focus on the healthcare sector.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets