In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.
All about Virtualization and Cloud Security | Recent Articles:
Fraudsters have moved from making a fast buck to crafting more ambitious, targeted attacks that produce long-term profits, according to an extensive analysis of real-world cybercrime attacks.
Just months before the EU General Data Protection Regulation takes effect globally, more than half of US-based employees in various industries have never heard of the upcoming regulation, according to a survey by adaptive training experts at MediaPro.
Conventional endpoint security solutions - originally designed for hardware-defined, premise-based infrastructure - are unsuitable for the modern data center. As a result, 58.4% of IT execs say that the lack of infrastructure-agnostic security is the main challenge in the data center transformation process.
Fears about the security and privacy of data stored in the cloud seem to have decreased somewhat over the years, perhaps because organizations have become more comfortable with the idea of entrusting service providers with their digital assets.
A new Bitdefender survey reveals that security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a prime concern.
As 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the upcoming malware developments that will likely emerge in the year to come. Bitdefender experts predict an increase of zero-day exploits leaked from security agencies the world over, and massive changes to the way ransomware operates.
The past few months have spurred a dramatic reshaping of the threat landscape. Traditional threats such as generic Trojans, ransomware and spam bots have been massively complemented by data destructors. Powered by military-grade code allegedly leaked from the NSA, both WannaCry and GoldenEye wrought havoc throughout Q2 and Q3, shutting down businesses and causing unprecedented operating losses.
We’re hearing more and more about smart cities, as the Internet of Things, artificial intelligence, sensors, higher bandwidth, and other technology advancements make it more feasible to modernize population centers.
When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.
We are all too familiar with the expression “consumer is king.” Companies devise complex strategies to convert potential customers into buyers, then use retention schemes to keep the revenue flowing. And if recent studies are any indication, U.S. businesses are doing a heck of a job at holding on to their customer base.
We’re hearing more and more about boards of directors playing a greater role in cyber security efforts as a growing number of data breaches make headlines, and now there’s data to back it up. Unfortunately the same research indicates that enterprises need to do much more work to improve their cyber security programs.