Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Six in 10 US employees clueless about GDPR – survey

Jan 11 by Filip Truta

Just months before the EU General Data Protection Regulation takes effect globally, more than half of US-based employees in various industries have never heard of the upcoming regulation, according to a survey by adaptive training experts at MediaPro.

Read More

Businesses using GDPR as catalyst to enhance cyber risk management

Oct 17 by Filip Truta

A survey of 1,300 senior executives at companies doing business in the EU reveals that the most-prepared firms are using the General Data Protection Regulation (GDPR) as a catalyst to up their game in cyber risk management.

Read More

How security teams commonly sabotage their own efforts

Jun 17 by George V. Hulme

It seems there’s no shortage of enterprises that fall short when it comes to protecting their information and digital assets. Most of the time you will see this blamed on new attack techniques, advanced forms of custom malware, and the rise in recent years of state-sponsored snoops and criminals. Security professionals have it tough, as their adversaries are always improving their tactics, no doubt. And the technologies their organization uses to boost productivity and provide new services are always advancing in areas such as mobility, cloud, data analytics, and soon the Internet of Things.

Read More

Companies Piling up Bitcoins for Cyber-extortionists - Is this Defeat?

Jun 10 by Alexandra Gheorghe

It seems UK businesses are raising a white flag to online extortionists. One in three medium to large businesses is stocking up on Bitcoins to prepare to pay ransom in a ransomware attack, according to  new research by Citrix.

Read More

‘Is this data mine?’ How to answer this honest question in data breach verification

Jun 08 by Alexandra Gheorghe

Established companies like LinkedIn, Tumblr and MySpace are being run through the mill because of old security breaches that recently surfaced on the web. From a victim’s perspective, mitigation starts with a password reset, but what’s happening on the corporate side? How should companies react in full breach era to clean up the mess and regain clients’ credibility?

Read More

Are Concerns About Security and Privacy Threatening the Future of Online Commerce?

Jun 02 by Mihaela Paun

If no one trusted the Internet, what would that mean for online business—or even for business in general? Even as so many consumers and businesses rely on the web to conduct all kinds of transactions, fears about data breaches and loss of privacy has many people spooked about sharing personal information online.

Read More

Cyber insurance market remains fluid

May 30 by George V. Hulme

We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity Insurance: Closing the Widening Risk Gap. This is a fast-moving market, and one I think that will increasingly affect how enterprises help manage cybersecurity risks. And, in the long term, insurance may even help enterprises more cost effectively and efficiently reduce risk. But the road there is going to be filled with bumps and false starts – if that end state will be reached at all.

Read More

The essential value of good threat intelligence

May 26 by George V. Hulme

In reaction to the rising complexity and increased damage of certain cyber-attacks, more enterprises have been turning to threat intelligence as a way to stay tuned to the risks. Last year, Enterprise Strategy Group released a survey that found 72% of organizations planned to increase their threat intelligence programs this year.

Read More

Building a Culture of Security

May 19 by George V. Hulme

Some argue that successful information security is a matter of getting the technology right. Others contend that it’s more about training and education. I think both views are valid, but neither is complete. Good information security is about technology design and deployment, to be sure. But it’s also about people and the right processes being in place.

Read More

Struggling to Control a Burgeoning Number of Endpoints? Consider a Centralized Management Strategy

May 02 by Shaun Donaldson

The definition of corporate “endpoints” is constantly evolving, and securing those endpoints is becoming increasingly complex for enterprises. As the SANS Institute points out in its March 2016 Endpoint Security Survey, endpoints now include non-traditional computing devices or "things," and IT professionals are becoming aware of the fact that those endpoints require different thinking around security.

Read More

Cybersecurity Insurance: Closing the Widening Risk Gap

Apr 26 by George V. Hulme

It seems no matter how hard enterprises try, no matter what investments in security controls and processes they make, and no matter how much they strive to harden their systems, data breaches, data manipulation, cyber extortion and other attacks on availability are going to happen. Just like taking precautions to protect themselves from fraud and theft, or natural disasters like hurricanes, tornados, earthquakes and fires. Industry takes steps to mitigate these risks, but can’t eliminate these risks. Cybersecurity is much the same.

Read More

How IoT and Security Play Out in a Businesses Environment

Apr 18 by Alexandra Gheorghe

The Internet of Things and quantified-self movements have led to an explosion of interesting gadgets for consumers and households, and we've detailed the types of IoT vulnerabilities and attacks in smart homes in our latest research paper. But the IoT is also laying the foundations of a new way of working. It’s about using information technology to reshape how, and where, we work.

Read More

Cloud Security

Subscribe to Blog Updates

Posts by Categories

Latest Tweets