Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Stop shifting the blame onto third parties. That breach is still your firm’s responsibility

Mar 20 by Graham Cluley

If it’s data that your customers gave you that’s breached, it’s your responsibility.

Read More

A third of Fortune 100 boards have a director who is a CIO

Mar 16 by Razvan Muresan

A third of Fortune 100 boards currently include a director who is a CIO. According to unpublished Korn Ferry data, cited by Harvard Business Review, the number of CIOs serving on Fortune 100 boards has increased 74% in the past two years.

Read More

Cyber security spending to reach $90 billion in 2017, Gartner says

Mar 15 by Razvan Muresan

Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020, according to advisory firm Gartner. Spending on enhancing detection and response capabilities will likely be a key priority for security buyers through 2020.

Read More

Most IT pros expect an increase in attacks on security of industrial IoT, survey shows

Mar 14 by Razvan Muresan

Some 96 percent of IT professionals expect an increase in attacks on the security of industrial IoT (IIoT), a recent survey shows.

Read More

Epic Yahoo Data Breaches Lead to Big Drop in Value Prior to Planned Acquisition By Verizon

Mar 08 by Razvan Muresan

The good news for Internet entertainment, news and search site Yahoo Inc. is that Verizon Communications Inc. is still interested in acquiring the company following its disclosure of massive data breaches. The bad news is that the value of the deal has dropped precipitously after the security incidents became public knowledge.

Read More

One in 10 German companies was breached in the past year, survey shows

Mar 03 by Razvan Muresan

Some 12 percent of companies in Germany were breached in the past year, and most IT decision makers don’t know how their company was breached, according to a Bitdefender survey of 100 German respondents.

Read More

Businesses risk fines of 4% of annual revenue for failing to comply with GDPR, PwC says

Feb 27 by Razvan Muresan

Companies that offer goods and services to EU citizens will have to intensify their focus on privacy issues when the European Union’s General Data Protection Regulation (GDPR) takes effect in April 2018, according to a report by consultancy firm PwC.

Read More

Why it’s Vital to Ensure Strong Security in a Hyperconverged Data Center

Feb 24 by Bogdan Botezatu

Among the hottest trends in data center technology today is the growth of hyperconvergence, an IT infrastructure framework in which virtualized computing, networking and storage components are tightly integrated within a data center.

Read More

Public Cloud Services Market to Grow 18% to $246.8 Billion in 2017, Gartner says

Feb 23 by Liviu Arsene

The global public cloud services market is expected to grow by 18 percent in 2017 comparted to 2016, totaling $246.8 billion this year, from $209.2 billion last year, according to Gartner.

Read More

Half of UK companies increased cloud security spending in the past year

Feb 22 by Razvan Muresan

Cloud security spending increased for 49 percent of UK companies in the past year, while the IT security budget for other security activities remained the same, according to a Bitdefender survey of 153 IT decision makers in the United Kingdom in companies with more than 1,000 PCs.

Read More

65% of IT professionals feel Shadow IT is compromising cloud security

Feb 14 by Graham Cluley

Has your company embraced the cloud?

Read More

Bug Bounty Programs: Significant Benefits, Challenges

Jan 03 by George V. Hulme

There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.

Read More