Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Machine Learning – A Tool for Augmenting Security

Sep 15 by Liviu Arsene

The use of machine learning algorithms in the security industry has become a necessity with the rapid growth of malware samples. Obfuscation, polymorphism and encryption have caused a surge in new malware, which now numbers in the hundreds of millions of samples hunting on the internet.

Read More

How do I tell my CFO what security technologies to buy?

Aug 02 by Liviu Arsene

Chief Financial Officers (CFOs) these days have a hard time balancing budgets and acquisitions, especially when it comes to security. While for a CIO or a CSO the decision to invest in security might seem like a no-brainer, CFOs have to evaluate security spending against other business costs. And security is often difficult to distinguish from IT operations if you’re not involved in either.

Read More

Ransomware attacks increase 300% in 2016

Mar 24 by Luana Pascu

In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. Ransomware is among the worst types of infection, as it not only encrypts network data, but in the end may cost victims all their data – even if they pay the ransom. It should be a priority for all businesses and organizations in 2017.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More

Outnumbered, yet Strong: Artificial Intelligence as a Force Multiplier in Cyber-Security

Jul 12 by Cristina Vatamanu

When talking about artificial intelligence, people typically envision a Sci-Fi world where robots dominate. But artificial intelligence is already improving everyday technologies such as ecommerce, surveillance systems and many others.

Read More

How security teams commonly sabotage their own efforts

Jun 17 by George V. Hulme

It seems there’s no shortage of enterprises that fall short when it comes to protecting their information and digital assets. Most of the time you will see this blamed on new attack techniques, advanced forms of custom malware, and the rise in recent years of state-sponsored snoops and criminals. Security professionals have it tough, as their adversaries are always improving their tactics, no doubt. And the technologies their organization uses to boost productivity and provide new services are always advancing in areas such as mobility, cloud, data analytics, and soon the Internet of Things.

Read More

The Internet of Things: Big Opportunity, Huge Security Challenge

May 18 by Shaun Donaldson

One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly hype for sure, but IoT is nevertheless something all IT and security executives should be learning about, if not actually focusing on as a corporate strategy.

Read More

Struggling to Control a Burgeoning Number of Endpoints? Consider a Centralized Management Strategy

May 02 by Shaun Donaldson

The definition of corporate “endpoints” is constantly evolving, and securing those endpoints is becoming increasingly complex for enterprises. As the SANS Institute points out in its March 2016 Endpoint Security Survey, endpoints now include non-traditional computing devices or "things," and IT professionals are becoming aware of the fact that those endpoints require different thinking around security.

Read More

Cyberattacks, Cybersecurity, and Where’s It All Heading

Mar 28 by Liviu Arsene

Cybersecurity has become a major topic of discussion for businesses and organizations of all sizes, as the number of security incidents has spiked, capturing headlines worldwide. 

Read More

Email is Deprecated, but Still a Threat

Feb 22 by Bogdan Dumitru

It’s been 38 years since the invention of email and today, it is still the number one communication tool in and out of enterprises. While technology, hardware, infrastructure and the internet itself evolved tremendously in the past almost 4 decades, email is the spoiled child of the family that declines to grow up. 

Read More

The Simple Way to Stop your Business from Being Extorted by Ransomware

Feb 19 by Graham Cluley

Online extortion is on the rise.

Not only have recent months seen an increase in distributed denial-of-service attacks with demands that companies pay up to have their website returned to normal working order, and even the theft of confidential data with threats that it will be released to the public if financial demands are not met, but there has been a noticeable increase in ransomware attacks too.

Read More

Advanced Persistent Threats – Silver Bullets That Fail

Jul 24 by Horatiu Bandoiu

This is the second post from a series we thought necessary to dedicate to APTs (Advanced Persistent Threats) and the new wave of security technologies claiming that they replace or complement antimalware solutions to help organizations defeat this new threat.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets