Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Considering McAfee Alternatives? Make Replacement an Upgrade

Apr 19 by Peter Craig

“When in doubt, choose change.”  (Lily Leung)  


  • McAfee has agreed to sell its enterprise business
  • Many McAfee customers may be considering alternatives 
  • Don’t just replace - upgrade 
Read More

Bitdefender Launches Major Enhancements to its Global Partner Program

Apr 15 by Steve FIORE

The global cybersecurity landscape has changed dramatically over the past year due to the COVID-19 pandemic as adversaries look to use the outlier event to their advantage. 

Read More

DHS Official: Cybersecurity a "top priority" for Biden Administration

Apr 12 by George V. Hulme
  • S. Secretary of Homeland Security details Federal Cybersecurity Strategy.
  • Initial focus on ransomware, workforce, industrial control security.
  • The federal government needs to take a risk-based, long-term view on cybersecurity.
Read More

New Bitdefender Report Highlights Unique Security Challenges of 2020

Apr 07 by Bob Violino
  • Ransomware, banking malware, unwanted applications, and Android attacks all rose significantly
  • Pandemic-related incidents had a big impact
  • Similar threats expected for this year, and cyber security teams need to have the right security tools in place

 

Read More

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Apr 02 by George V. Hulme
  • Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
  • Such breach disclosure laws have been long found over legal concerns.
  • The EO would also establish that certain software vendors maintain a software bill of materials.
Read More

Anti-Exploit Technology is Fundamental for Cloud Workload Security

Apr 01 by Shaun Donaldson
  • All attacks include malicious activity, but not all attacks include writing malware to disk 
  • Anti-exploit technology prevents attackers from gaining a foothold 
  • What to look for in anti-exploit technology 

Attacks, exploits and vulnerabilities 

Any complete cloud workload security stack must feature robust anti-exploit technology for both end-user and server systems. Cloud workloads run on servers, either on-premises or in the cloud, and end-user systems access those workloadsEnd-user systems can give attackers indirect access to workload data, while servers can provide more direct access if attackers achieve a foothold.  

Read More

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

Mar 31 by Steve FIORE

Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain access to an organization’s network systems over a long period of time in order to covertly steal sensitive information or drain financial resources. 

Read More

EDR or MDR: Two Paths to Successful Security Defense

Mar 29 by Mia Thompson
  • EDR and MDR represent two viable paths to achieving successful security defense
  • Internal teams use EDR tools to launch investigations and guide remediation actions
  • MDR brings professional cross-skilled security analysts and proactive threat hunters
  • Security tipping point is determined by gaps in time, skills, efficiency and outcomes
Read More

Advanced Encryption will be Key to Future Cyber Security Efforts

Mar 25 by Bob Violino
  • Efforts have long been underway to create more advanced cryptography, and the market appears ready to deploy these solutions
  • Promising new approaches include quantum key distribution, biometrics encryption, and homomorphic encryption
Read More

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

Mar 25 by Bogdan Carlescu

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems.


Read More

Businesses! Beware The Vengeful IT Contractor!

Mar 24 by Graham Cluley
  • Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts
  • Always revoke the access rights of former employees and contractors
Read More

Malware Delivered Via Cloud Services Rises

Mar 23 by George V. Hulme
  • 53% of Web traffic is now cloud-related, a 20% year over year increase.
  • 61% of all malware is directly delivered via the cloud.
  • Malicious Office documents represented 17% of all malware detected.
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets

Posts by Month