Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Businesses Invest Heavily toward ‘Secure by Design’ GDPR Requirement

Apr 19 by Filip Truta

Less than two months before the European Union enforces its stringent General Data Protection Regulation (GDPR), businesses are rushing to achieve compliance, procedurally and technologically.

Read More

As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million

Apr 14 by Filip Truta

One of the hottest topics in the business world these days is the General Data Protection Regulation (GDPR), the European Union’s endeavor to create a unified framework that governs how data collectors and processors safeguard the privacy of their users and build walls that cybercriminals can’t penetrate.

Read More

GDPR & EDR: Protecting Personally Identifiable Information of EU Citizens

Apr 04 by Filip Truta

In 2017, Gartner found organizations were gravely underprepared for the European Union’s General Data Protection Regulation (GDPR). More than half of companies affected will not be in full compliance when the regulation takes effect in May 2018, the group said.

Read More

The Dirty Dozen Vendors Deluging Your Vulnerability Management Team

Feb 26 by Ericka Chickowski

We've all heard about the 80/20 rule in business. But in vulnerability management, it may be more like the 54/12 rule. According to a new report out last week by vulnerability intelligence firm Risk Based Security, in 2017 about 54% of all new vulnerabilities came from just 12 vendors.

Read More

Nearly Half of Organizations Cite Employees as Biggest Risk

Feb 22 by George V. Hulme

The more things change, the more they stay the same. While the nature of the technology employees use has dramatically changed over recent decades – from immovable desktops connecting to internal networks to iPads and netbooks with the ability to work anywhere — insiders and employees have remained among the greatest risks. According to the 2018 Netwrix Cloud Security Report, which consists of a survey of 853 various-sized organizations, industries and geographical locations. All organizations are public or hybrid cloud users.

Read More

Five Security Books You Should Read if You Haven’t

Feb 14 by George V. Hulme

-

Read More

Bitdefender Ranks The Top 10 Malware Threats of 2017

Feb 12 by Bogdan Botezatu

Recent months have seen a dramatic reshaping of the cyber security threat landscape, according to the “Global Threat Landscape Report—2017,” by Bitdefender.

Read More

Communication is key when responding to a cybersecurity incident

Jan 26 by Graham Cluley

There’s an old joke that goes something like this: “To err is human, but to really screw things up you’ll need a computer.”

Read More

US Commerce on Security and Market Incentives — Consumers don’t want security

Jan 22 by George V. Hulme

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.

Read More

Any organization could be the target of a data breach in 2018, digital identity experts say

Jan 17 by Filip Truta

Fraudsters have moved from making a fast buck to crafting more ambitious, targeted attacks that produce long-term profits, according to an extensive analysis of real-world cybercrime attacks.

Read More

Six in 10 US employees clueless about GDPR – survey

Jan 11 by Filip Truta

Just months before the EU General Data Protection Regulation takes effect globally, more than half of US-based employees in various industries have never heard of the upcoming regulation, according to a survey by adaptive training experts at MediaPro.

Read More

CISOs require infrastructure-agnostic security and visibility to support data center modernization, survey shows

Dec 26 by Razvan Muresan

Conventional endpoint security solutions - originally designed for hardware-defined, premise-based infrastructure - are unsuitable for the modern data center. As a result, 58.4% of IT execs say that the lack of infrastructure-agnostic security is the main challenge in the data center transformation process.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets