Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Attackers Outrunning, Outsmarting Healthcare Defenses

Nov 19 by George V. Hulme

According to a new study, 2019 has been yet another brutal year for healthcare cybersecurity. In 2019, so far, nearly four out of five breaches in the industry struck health care providers. And 53% of those attacks were at the hands of external attackers, respondents to a new survey said.

Read More

American Shoppers to Blame Financial Institutions in Case of Data Breach

Nov 18 by Silviu Stahie

With the holiday season fast approaching, American consumers already know who to hold responsible if their credentials are stolen in a data breach. 68% of the shoppers say banks should shoulder part of the blame, no matter where the breach occurred.

Read More

Keep Your Security Operations in Shape

Nov 15 by Andrei Pisau

Prevent alert fatigue with actionable threat intelligence

Suspicious. Suspicious. Suspicious. You scroll down as you sift through your thousandth false positive today. And it’s not even noon. You take a small break, after one last glance at the screen. After all, no real threat has been detected in months. What could go wrong? 

Read More

Record Number of Breaches and Leaked Records Registered in 2019, Study Shows

Nov 14 by Silviu Stahie

2019 is on track to set a record for the highest number of security incidents ever recorded, with 5,183 data breaches and 7.9 billion records exposed by November in the United States alone, according to a report from Risk Based Security.

Read More

The Underworld Economy

Nov 13 by Liviu Arsene

Imagine a world in which you could simply click onto a website to buy drugs, weapons, fake IDs, malicious software and ‘how to’ guides for building AK47s. In just a button press, you could own just about any illegal item you can think of. In the realm of the dark markets, this world, or underworld, is very much a reality.

Read More

Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows

Nov 12 by Silviu Stahie

The lack of certified cybersecurity professionals is felt throughout the world, and the industry would need to more than double the number of staff to meet the market’s needs, according to a study by (ISC)². As it stands, the supply of qualified labor only meets around 40% of demand.

Read More

CFOs Getting More Involved in Cyber Security Strategies

Nov 11 by Bob Violino

CISOs, CSOs, and CIOs are not the only C-level executives with a deep concern about cyber security. New research shows that CFOs appear to be taking a more active role in ensuring that their organizations are protected against data breaches, hacks, malware, and other threats.

Read More

PayPal Surpasses Microsoft as Favorite Target of Phishing Attacks

Nov 08 by Silviu Stahie

PayPal has now overtaken Microsoft to become the favorite target of phishing campaigns, according to a third-quarter 2019 report by email security firm Vade Secure.

Read More

Phishing Activity Rises to Record in Third Quarter, APWG Report Says

Nov 07 by Silviu Stahie

The number of phishing campaigns has been expanding steadily in recent years as cybercriminals target both private individuals and corporations with social engineering scams, according to the Anti-Phishing Working Group (APWG).

Read More

Debunking The BlueKeep Exploit Hype – What You Should Know

Nov 07 by Andra Cazacu

WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to have the same disruptive potential as EternalBlue (the exploit responsible for WannaCry) if sporting worm-like behavior, especially since RDP is a commonly used service in organizations, allowing IT and security teams to remotely dial into machines.

Read More

Implementing Security Best Practices in the Virtual Data Center

Nov 06 by Michael Rosen
  • Virtual data center security must be agile and mapped in real-time to virtual infrastructure management tools
  • Offloading of anti-malware scanning improves user experience, reduces redundant scans, and provides high availability
  • Born-secure VM instantiation ensures compliance, improves virtualization density, and minimizes application latency
Read More

Throwing More Money at Cyber Security Challenges Will Not Necessarily Address Them—Companies Need to Spend Wisely

Nov 06 by Bob Violino

Here’s a disturbing bit of information: a large number of IT security leaders and teams don’t know if cyber security tools are working as they should, despite organizations investing millions of dollars in such technology each year.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets