When it comes to attaining readiness for General Data Protection Regulation (GDPR) the clock is ticking. The GDPR is a set of regulatory mandates (Regulation (EU) 2016/679) that seek to shore up and streamline data protections for citizens within the European Union, including providing residents control over data about them and limiting exports of such data outside the union.
All about Virtualization and Cloud Security | Recent Articles:
A catastrophic cyber attack could generate up $121 billion of economic losses, according to a report by cyber insurance company Lloyd's of London, cited by Reuters.
Some 75 percent of US CISOs state the worst consequences of an attacker gaining access to their companies’ most valuable asset would be the financial cost and reputational damage. However, few say the financial cost could lead to bankruptcy 35%.
More than a third of IT execs in Italy say bankruptcy could be the worst consequence of an advanced persistent threat (APT), according to a recent survey by security firm Bitdefender.
Many organizations believe that turning to cloud can help them better secure their environments, and many also contend that DevOps practices help them to better build secure software. While that is certainly debatable, a new survey of 929 IT professionals found that the majority believe that the best benefits come from combining DevOps and cloud.
Employees are an optimal entry point for attackers seeking a way in to a company’s weak infrastructure. Cybersecurity and insider threats are two of the highest concerns confessed by CIOs and CISOs. Therefore, user negligence with company networks and devices is the main agent for cyber breaches and data leaks, especially when social engineering techniques are deployed.
Advanced persistent threats (APTs) have once again made it into the spotlight with the latest cyberattacks associated with APT28, also known as Fancy Bear or Sofacy. The Kremlin-sponsored hacking group behind the Democratic Party breach scandal, the attacks against NATO or those on French TV network TV5 is now shifting attention towards Europe. Earlier this week the campaign of Emmanuel Macron, favorite to become France's next president, was allegedly targeted by the same cyber espionage group.
When companies suffer a data breach, employees are usually key in enabling hackers to access to the infrastructure to steal sensitive information. In spite of billion-dollar efforts to bolster corporate security and educate employees, Internet users in the US still have little knowledge about basic cybersecurity, according to a recent Pew Research survey.
Wrongly considered the new kid on the block by some enterprises, virtualization technology has been around for a decade and embraced by many technology-oriented businesses due to its flexibility and room for expansion, increased productivity, superior storage capacity, and lower costs, among others.
For many enterprises, the software-defined data canter (SDDC) is the IT infrastructure of the future. And for innovative organizations it’s the data center of the present. Either way, SDDC offers a number of compelling potential benefits compared with traditional data center environments, such as reduced costs and greater agility.
If it’s data that your customers gave you that’s breached, it’s your responsibility.
A third of Fortune 100 boards currently include a director who is a CIO. According to unpublished Korn Ferry data, cited by Harvard Business Review, the number of CIOs serving on Fortune 100 boards has increased 74% in the past two years.