Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Hypervisor Introspection: Fighting APTs in Business Environment – Part 2

Jun 23 by Liviu Arsene

Since nothing that’s being executed in raw memory is encrypted – just scrambled – APTs that try to execute malicious code on a machine will be intercepted by HVI long before they actually compromise the operating system. In fact, as soon as the malicious code, even delivered via zero-day exploit, tries to execute in the VMs memory, the introspection engine will immediately “see” the malicious action and the code that was trying to be executed.

(back to reading part 1)

Read More

Major Mistakes That Can Leave Any CIO Jobless

Apr 07 by Razvan Muresan

CIOs are becoming increasingly important as cybercrime inflicts significant operational, reputational and financial damage, and company boards fear losses that might ruin business forecasts.

Read More

10 Tips on How to Secure Your Cloud

Apr 04 by Liviu Arsene

The global public cloud services market is expected to grow to $204 billion in value by the end of 2016, while the global IT cloud infrastructure – public and cloud – reached $7.6 billion in Q3 2015. 

Read More

The Cloud Dilemma - Is Your Cloud Provider Secure?

Mar 14 by Alexandra Gheorghe

In 2010, cloud adoption among US small medium businesses (SMBs) was just 5 percent—today, 37 percent are on the cloud, and the percentage will double by 2020, according to Forbes.

Read More

6 Tendencies Taking Shape in Enterprise Security this Year

Mar 07 by Bogdan Dumitru

Two years ago, the world rushed to say the antivirus industry is dead. I disagree simply because antivirus companies do not exist anymore. I haven’t seen a security company that limits its portfolio to one, traditional security (antivirus) solution. Those who’ve tried are dead and gone, but most of them have morphed into cybersecurity companies.

Read More

Continuous Software Assessment for Highly Secure Web Applications

Feb 29 by George V. Hulme

If your organization isn’t being systematic and proactive when it comes to securing your web applications, you’re not doing everything that can be done to defend systems and data. And that could lead to interruption in software services, stolen data, lost revenue, or the embarrassing and costly exposure of customers’ personally identifiable financial information.

Read More

Fearing Cloud and IoT Leads to Privacy Concerns

Feb 18 by Liviu Arsene

The fear of not having enough privacy has been on many people’s mind for the past couple of years, as internet service providers have started collecting user data to either better their marketing campaigns or provide new services that fit customers’ needs.

Read More

Enterprises Mandate Transparency For Better Cloud Security

Jun 18 by Ericka Chickowski

Cloud security concerns are starting to dissolve away as security technology and risk management practices mature in cloud and virtualized environments.

Read More

Can Channel Partners Benefit from the Growth of Public Cloud?

Jun 08 by Robert Krauss

It’s no secret that the public cloud has become a way of life for many businesses as well as consumers looking to download apps or store their large data files.

Read More

The Cloud and Data Analytics Play Key Roles in Info Security

May 21 by Robert Krauss

Two of the more prominent trends in the IT world are the continuing growth of cloud computing and the increasing use of data analytics as a valuable business tool. Both of these areas can play a prominent role in information security efforts—and indeed to some extent they already are, according to recent research reports.

Read More

Reboot the cloud? Yes, it has happened, and here’s why.

May 13 by Shaun Donaldson

While rare, every now and then, major cloud providers such as Amazon must ponder interrupting service to reboot parts of their environments. It is a curious thing, and leads to asking, “Why?”

Read More

3 Cloud Security Truths For CISOs

May 07 by Ericka Chickowski

As cloud initiatives shift from cost savings efforts to strategic transformations of IT and the business, CISOs are finding that in many ways they need to completely reimagine their security controls to keep up.

Read More

Cloud Security

Subscribe to Blog Updates

Posts by Categories

Latest Tweets