More than 80 percent of IT professionals in Sweden are concerned with the security of the public cloud, and almost 40% do not deploy security for sensitive data stored outside the company’s infrastructure, according to a recent Bitdefender survey. More than half of CISOs admit cloud migration has significantly expanded the size of the border they have to defend, while only one in eight percent encrypt already migrated data.
All about Virtualization and Cloud Security | Recent Articles:
Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.
Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.
If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq.
Two of the more notable trends in IT today also happen to be inter-related: the rapid growth of cloud computing services and the rising need for more effective cyber security solutions.
Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.
Strong cyber security can help businesses win customer loyalty, protect reputations and attract new prospects. Nine in 10 businesses say that improving cyber security would enhance customer loyalty and trust, while also improving their reputation in the market, potentially attracting new customers, according to a recent survey.
One of the top challenges many cyber security executives face today is deciding which technologies to invest in to strengthen their organizations’ security posture.
Nine in ten IT execs in the UK are concerned with the security of the public cloud, and almost 20% do not deploy security for sensitive data stored outside the company’s infrastructure, according to a recent Bitdefender survey. Half of those surveyed admit cloud migration has significantly expanded the size of the border they have to defend, while only one in five encrypts already migrated data.
The use of machine learning algorithms in the security industry has become a necessity with the rapid growth of malware samples. Obfuscation, polymorphism and encryption have caused a surge in new malware, which now numbers in the hundreds of millions of samples hunting on the internet.
GDPR, a new legal framework, was approved in the European Union in April 2016, after a seven-year journey from idea to implementation. The regulation addresses consumer rights and data privacy in relation to business conducted in EU member states.
We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.