Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

May 31 by Luana Pascu

A few years ago, companies were reluctant to adopt cloud computing because they thought a lack of physical access to the network would deprive them of control over their data. A major shift occurred when they understood that, with suitable configuration and security, cloud computing offers serious benefits.

Read More

Security Must Adjust as SDN Goes Mainstream

May 25 by Ericka Chickowski

After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on the cusp of big breakthroughs. So say the results of the new research from Enterprise Management Associates (EMA).

Read More

Loopholes in Cloud Security Exposed Online 50% of Corporate Databases

May 21 by Luana Pascu

Cloud security has grown into a major issue for enterprises, as only one company in six encrypts all data, according to a Bitdefender survey. While 85% of CISOs fear security flaws in the public cloud, as many as 51 percent of enterprises don’t properly secure their cloud storage services, according to RedLock, leaving their data exposed to hackers.

Read More

Some Organizations Pulling Workloads Back from the Cloud Because of Security, Data Management Concerns

Mar 13 by Razvan Muresan

Everyone in IT knows how much the cloud is becoming a central and strategic component of the modern technology infrastructure at many enterprises. Perhaps less well known is the fact that a lot of organizations have pulled workloads back from the cloud—in part because of concerns about data management and security.

Read More

Shifting Gears to Cloud-Centric Cybersecurity

Mar 12 by Ericka Chickowski

As enterprises bridge their adoption patterns for public cloud from isolated pilot projects to fully scaled environments, they're going to need to get serious about adjusting their cybersecurity strategy and architecture to accordingly. According to the thinkers at McKinsey & Company, that sea change needs to start now. In a new report out last month by the consulting firm, enterprises are finally doubling down on their public cloud experiments over the last decade. And that means an impending cascade of public cloud usage in critical infrastructure that previously remained entrenched in the on-prem world.

Read More

IT Security Pros Neglect Obvious Source of Tips on Fighting Future Threats: The Past

Mar 06 by Filip Truta

An increase in cyber threats and a failure to learn from past incidents place the security of data, infrastructure and assets at risk, according to a new threat landscape report.

Read More

1 in 50 Publicly Readable Amazon Buckets Are Also Writable – And That’s a Data Disaster Waiting to Happen

Mar 01 by Graham Cluley

Now is not the time to dilly-dally. If you haven’t already properly secured the Amazon Web Services S3 servers (known as “buckets”) storing your sensitive data in the cloud then your business has no time to lose.

Read More

Cybersecurity – A Top Risk Management Priority for Senior Execs, But Only On Paper

Feb 21 by Filip Truta

As bad actors continue to hone their skills and governments keep raising the penalty for getting breached, large organizations across the globe seem to be doing little to mitigate the risks associated with cybercrime – despite knowing better for years.

Read More

How Is Machine Learning Used in Bitdefender Technologies?

Nov 20 by Luana Pascu

 The terms “artificial intelligence” and “machine learning” are often used interchangeably, but there’s a huge technical difference between them. While the first is used by Hollywood when depicting self-aware machines, the latter is comprised of finely tuned single-task algorithms that are nowhere near self-aware.

Read More

Report Says 1.9 Billion Data Records Were Compromised During First-Half 2017 Breaches

Nov 17 by Bogdan Botezatu

What were the biggest cyber security culprits in the first half of 2017 from a data breach standpoint? Identity theft and poor internal security practices, according to the latest Breach Level Index (BLI) Report by Gemalto.

Read More

Digital Transformation Brings Business Benefits—as Well as Security Threats

Nov 16 by Razvan Muresan

First, here’s the good news: Organizations today are in the midst of digital transformations and an acceleration of their online presence that is enriching their products, deepening customer relationships, and boosting the companies’ brands.

Read More

Five keys to consider when it comes to securing containers

Nov 14 by George V. Hulme

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets