Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Insider Threats Remain #1 Security Headache for Organizations, Research Shows

Apr 27 by Luana Pascu

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown and reputational damage. In the past year, 159 organizations from the United States, Canada, Europe, Middle East, Africa, and the Asia-Pacific region dealt with 3,269 security breaches caused by insider threats due to plain negligence.  

Read More

Changes to Data Breach Notifications in the Air

Mar 14 by George V. Hulme

Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and how quickly they should be notified. In fact, it’s become somewhat of a mess.

Read More

The Five Attributes Needed to Succeed at DevSecOps

Feb 27 by George V. Hulme

It’s hard to believe but the conversation around how security fits in DevOps has been going on for years. It was in 2012 when Gartner analyst Neil MacDonald wrote his blog DevOps Needs to Become DevOpsSec. In this blog MacDonald wrote “DevOps seeks to bridge the development and operations divide through the establishment of a culture of trust and shared interest among individuals in these previously siloed organizations. However, this vision is incomplete without the incorporation of information security, which represents yet another silo in IT.”

Read More

Employee Training a Security Priority for Financial CISOs in 2018, Study Says

Feb 14 by Luana Pascu

In the past two years, cyberattacks on the financial sector have picked up speed. As companies in the sector struggle with the major shift toward digital transformation, some are caught off guard by the significant rise of malware designed specifically to target their sector, such as Dyre Trojan, Dridex, hybrid banking Trojan GozNym and TrickBot. Once the network is infiltrated, hackers can easily steal, read, alter and even erase top secret information.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets