Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Framework Aims to Enhance the Security of Software

Jul 30 by Bob Violino

Software is powering much of the world today, from the largest computing machines to the smallest devices that can fit on a computer chip. That means there is a greater opportunity than ever for security breaches. As any end user knows, even the highest quality software can come with vulnerabilities.

Read More

Surprise: Healthcare Organizations Confident in Their Cybersecurity Efforts

Jul 29 by George V. Hulme

Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security Media Group (ISMG), recently announced the results of an online survey they conducted to identify current trends in healthcare cybersecurity. The survey is based on responses from more than 100 participants working within including hospitals, physician group practices and payers. The survey was conducted over the spring of 2019.

Read More

Breach Costs Keep Creeping Upward with Financial Fallout Lasting Years

Jul 26 by Ericka Chickowski

The cost of data breaches keeps increasing for companies, and new research indicates that the financial impact can continue to sap company coffers for years after the incident occurs. Released this week, the 2019 Cost of a Data Breach Report from Ponemon Institute showed that the average data breach now costs companies $3.92 million globally. This represents a 12% rise in breach costs over the last five years.

Read More

Lost Business Remains Top Contributor to Data Breach Costs for a Fifth Straight Year

Jul 25 by Filip Truta

Costs associated with a data breach have surged this year to $3.92 million, according to IBM’s latest Cost of a Data Breach study. And more than a third of it stems from lost business.

Read More

Data-Collecting Firms Have Only One Shot at Seeding Trust in Their Userbase, New Research Shows

Jul 23 by Filip Truta

As data protection authorities start to dish out GDPR-related fines, businesses in the US must learn to better communicate their data-handling practices to customers. The pressure is on for businesses to seed trust in their user base.

Read More

Applying Machine Learning to Network Centric Security

Jul 23 by Bogdan Carlescu
  • Machine Learning enables network security solutions to enhance their ability to detect advanced, stealthy threats 
  • Bitdefender NTSA relies on semi-supervised machine learning to identify key patterns and trends in live data flows, with minimal human input 
  • New, specialized ML algorithms help detect attacks that use DNS and FTP services
Read More

[INFOGRAPHIC] What Is the Hidden Cost of Security?

With less than six months until 2020, experts forecast the industry will be struggling to secure over 20 billion devices from attacks. Cybercrime will never cease to be a money-making machine, with hackers already making trillions of dollars from stealing sensitive data, medical records, financial information and credit history.

Read More

Cybersecurity a High Priority for 2019, UK Organizations Say

Jul 19 by Luana Pascu

The financial impact of cybersecurity breaches on companies in the UK has climbed to a whopping average of an annual £4,180 in 2019, nearly double 2017’s £2,450, according to a UK government survey conducted in winter 2018 and early 2019. The cost has risen significantly for companies that lost critical data or assets following a cyber incident or breach.

Read More

One in 10 Firms Loses Over $10 Million from a Cyber Attack

Jul 18 by Filip Truta

Companies worldwide expect to boost cybersecurity investments by 34% in the next fiscal year, after raising them 17% the current year, new research shows. The reason? More than one in 10 firms loses upwards of $10 million after falling victim to a cyber attack.

Read More

Hospitals, Clinics in Los Angeles Hit by Data Breach

Jul 17 by George V. Hulme

Phishing attacks strike again. Last week, Nemadji Research Corp., which does patient eligibility and billing services work for the Los Angeles County Department of Health Services, discovered that they’d been breached by a phishing attack. The attack enabled the criminals to gain access to the medical records of nearly 15,000 patients.

Read More

Measuring Security Continuum Shift: Where Are You On Endpoints?

Jul 16 by Ed Amoroso

Cyber security pros often conceptualize a linear continuum of protection strategy: The left portion of the line represents security measures that tend to be more preventive of cyber threats, and the right portion represents more reactive approaches. In the early days of cyber security, it was believed that any shift to the right was a concession to the adversary. More recently, however, shifts right are often viewed as showing justified respect for the adversary.

Read More

Poor Healthcare Industry Security Hygiene Places Lives at Risk

Jul 15 by George V. Hulme

No one wants to go to the doctor’s office. Well, I guess some people do. I’m certainly not one of them. But imagine going to the doctor and then watching in horror as the medical equipment or computers the teams of doctors are working on aren’t working.  That, suddenly, the come under attack just as you are “going under the knife.”

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets