Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Swedish companies are still struggling to comply with latest data protection regulations

Oct 13 by Razvan Muresan

More than 80 percent of IT professionals in Sweden are concerned with the security of the public cloud, and almost 40% do not deploy security for sensitive data stored outside the company’s infrastructure, according to a recent Bitdefender survey. More than half of CISOs admit cloud migration has significantly expanded the size of the border they have to defend, while only one in eight percent encrypt already migrated data.

Read More

Warning: Data Breaches In News Always Worse Than They First Appear

Oct 12 by George V. Hulme

Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.

Read More

Mobile Stock Trading Apps Found To Be Poorly Secured

Oct 11 by George V. Hulme

Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.  

Read More

Linux Users, especially those in IoT, remain At-risk

Oct 10 by George V. Hulme

If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq. 

Read More

Securing the Cloud: An Ongoing Effort

Oct 05 by Bogdan Botezatu

Two of the more notable trends in IT today also happen to be inter-related: the rapid growth of cloud computing services and the rising need for more effective cyber security solutions.

Read More

Duo Labs find thousands of ‘hidden’ vulnerable Macs

Oct 03 by George V. Hulme

Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.

Read More

Strengthening cyber security boosts customer loyalty and trust, survey shows

Sep 28 by Razvan Muresan

Strong cyber security can help businesses win customer loyalty, protect reputations and attract new prospects. Nine in 10 businesses say that improving cyber security would enhance customer loyalty and trust, while also improving their reputation in the market, potentially attracting new customers, according to a recent survey.

Read More

When it Comes to Security Tools, Enterprises Have Plenty of Choices

Sep 21 by Razvan Muresan

One of the top challenges many cyber security executives face today is deciding which technologies to invest in to strengthen their organizations’ security posture.

Read More

UK CISOs fear security flaws in the public cloud, yet only one company in five encrypts all data

Sep 18 by Razvan Muresan

Nine in ten IT execs in the UK are concerned with the security of the public cloud, and almost 20% do not deploy security for sensitive data stored outside the company’s infrastructure, according to a recent Bitdefender survey. Half of those surveyed admit cloud migration has significantly expanded the size of the border they have to defend, while only one in five encrypts already migrated data.

Read More

Machine Learning – A Tool for Augmenting Security

Sep 15 by Liviu Arsene

The use of machine learning algorithms in the security industry has become a necessity with the rapid growth of malware samples. Obfuscation, polymorphism and encryption have caused a surge in new malware, which now numbers in the hundreds of millions of samples hunting on the internet.

Read More

Road to GDPR compliance: how concerned should companies be about the new regulatory landscape?

Sep 13 by Luana Pascu

GDPR, a new legal framework, was approved in the European Union in April 2016, after a seven-year journey from idea to implementation. The regulation addresses consumer rights and data privacy in relation to business conducted in EU member states.

Read More

Five Must-See DEF CON Talks Available Now on YouTube

Sep 11 by George V. Hulme

We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets