Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Here Comes 5G—What are the Data Security Implications?

Feb 07 by Razvan Muresan

Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications.

Read More

What Information Do Cyber Criminals Most Want from Your Business?

Feb 06 by Filip Truta

Big cyber attacks like the Equifax incident in 2017 and the Marriot breach in 2018 have had devastating effects for those in the hackers’ crosshairs. But high-profile data breaches also hold important value for the good guys: clues to the attackers’ mindset.

Read More

Ensuring Strong Cyber Security at the Edge

Feb 05 by Razvan Muresan

We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications?

Read More

Research: Phishing Investigations Cost Companies $4.3 Million Per Year

Feb 04 by Filip Truta

Phishing remains the attack vector of choice for cybercriminals, with 23,000 incidents per organization annually, according to a new survey. Organizations spend on average $4.3 million per year to investigate phishing incidents.

Read More

Can Security Teams Tame Today’s Cloud Complexity?

Feb 01 by George V. Hulme

The promise was that cloud computing would simplify enterprise business-technology. Enterprise users would be able to focus on their applications and services while leaving the deeper security issues associated with infrastructure and secure delivery and management of applications to the cloud provider. It didn’t exactly turn out that way.

Read More

UK Enterprises to Compete for £70m in Government Cybersecurity Challenge

Jan 31 by Luana Pascu

After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and strengthen national infrastructure and consumer security, officials plan to issue an impressive challenge to enterprises across the UK.

Read More

ENISA Calls for Automated Defense against Automated Threats

Jan 30 by Filip Truta

2018 was a busy year for the cybersecurity sector, as independent cyber-criminals and state-sponsored actors alike further advanced their motives and tactics. Legislators in turn have flipped on the GDPR switch to punish organizations with lax security practices, and many still have a ways to go to achieve compliance.

Read More

Ensuring Strong Cyber Security at the Edge

Jan 29 by Razvan Muresan

We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications?

Read More

Government CIOs to Focus Technology Investments on Data Analytics and Cybersecurity in 2019, Gartner Says

Jan 28 by Filip Truta

Chief Information Officers in government are recognizing the importance of investing in game-changing technologies, including artificial intelligence, machine learning, analytics and blockchain. Spending on cybersecurity is projected to continue to rise as the government recognizes its role as the steward of public data, according to Gartner.

Read More

Business Payroll Compromise – a New Way for Criminals to Steal from Your Company

Jan 25 by Graham Cluley

Firms are being warned about a threat which evolves traditional business email compromise scams into a whole new way of extracting money from unwary companies.

Read More

Cybercrime to Cost $5.2 Trillion over Next 5 Years; High-Tech Industry Most at Risk

Jan 23 by Luana Pascu

Businesses are struggling to develop cyber resilience to fend off attacks as they seek to create flawless operations and to scale systems. Efficient cybersecurity in an advancing digital economy is no easy goal, as many factors are at play, including third-party risks and increased attack surface, as a result of extensive interest in IoT deployments. This is why corporates and governments need to work together to set up priorities to help enable digital transformation and build trust through proper safeguards on consumer data privacy.

Read More

The API Security Essentials You Need to Know

Jan 22 by George V. Hulme

In the modern enterprise, APIs are both the keys that unlockdata and the glue that makes system integration possible. But how steep are the associated security concerns APIs create?

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets