Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Outsider attack, the main cyber threat US companies are not prepared for

Nov 16 by Razvan Muresan

The main cyber threats companies are not prepared for are: outsider attack (43%), data vulnerability (38%), insider sabotage (35%), user errors (35%), and phishing (35%), according to a Bitdefender survey on US IT decision makers.

Read More

Security of data in transit, the main security concern of CIOs who migrate data to hybrid cloud

Nov 10 by Razvan Muresan

Companies are slowly joining the bandwagon with hybrid cloud adoption, but Gartner estimates that it’s still three to five years from going mainstream. By the end of 2015, only 15 percent of enterprises have adopted it so far, although the demand for hybrid cloud is estimated to be growing at a compound rate of 27% a year, outpacing overall IT market growth, according to researcher MarketsandMarkets, cited by The Journal. The company said it expects the hybrid cloud market to reach $85 billion in 2019, up from $25 billion in 2014.

Read More

The dark side of virtualization: two in three IT decision makers in the US fear job loss caused by security breaches

Nov 07 by Razvan Muresan

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs shows that virtualization is a strategic priority, yet they are still not fully ready for the security challenges this environment brings. Hybrid infrastructures have become the major common architecture in the enterprise environment and CIOs have to adapt to the new world. 

Read More

The Value Beyond the Hype: Applying Machine Learning in APT Detection

Sep 15 by Dragos Gavrilut

Advanced Persistent Threats are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. They routinely evade traditional security systems and steal confidential corporate information without a trace.

Read More

Cloud use increases attack surface up to 100-fold; companies fail to keep up with flood of threats

Aug 24 by Razvan Muresan

Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.

Read More

Tor vs. I2P – Anonymization and B2B Opportunity

Aug 18 by Liviu Arsene

The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.

Read More

Financial Services Providers Remain a Big Target of Security Intruders

Aug 08 by Razvan Muresan

Some time ago we examined the key cyber security issues and challenges facing a number of industries. Things change fast in the security arena, so we thought it would make sense to provide an updated look at some of these sectors.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More

Securing the Cloud - a challenge as well as an opportunity

Jul 04 by Mihai Guran

Cloud security has been perceived as the main issue of Cloud ever since the cloud first became a reality for enterprises. And despite many efforts to protect cloud services against data breaches and other attacks, recent research shows that much uncertainty, concern and turbulence remain when it comes to ensuring that data in the cloud is secure.

Read More

Cloud Use Will Mostly Be Hybrid by 2020, Gartner expects

Jul 01 by Razvan Muresan

The cloud will most commonly be used in a hybrid manner by 2020, according to a Gartner  report, emphasizing that operating entirely off the cloud will largely disappear by the end of the decade.


Read More

Hypervisor Introspection: Fighting APTs in Business Environment – Part 2

Jun 23 by Liviu Arsene

Since nothing that’s being executed in raw memory is encrypted – just scrambled – APTs that try to execute malicious code on a machine will be intercepted by HVI long before they actually compromise the operating system. In fact, as soon as the malicious code, even delivered via zero-day exploit, tries to execute in the VMs memory, the introspection engine will immediately “see” the malicious action and the code that was trying to be executed.

(back to reading part 1)

Read More

Major Mistakes That Can Leave Any CIO Jobless

Apr 07 by Razvan Muresan

CIOs are becoming increasingly important as cybercrime inflicts significant operational, reputational and financial damage, and company boards fear losses that might ruin business forecasts.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets