Bitdefender has been named an Advisory Board member for the Linux Foundation-hosted Xen Project formed of major cloud companies, virtualization providers, enterprises and silicon vendors that advise and support development of Xen Project software for cloud computing, embedded, IoT use-cases, automotive and security applications.
All about Virtualization and Cloud Security | Recent Articles:
Bitdefender will be attending Citrix Synergy 2017 in Orlando, Florida, at the Orange County Convention Center between May 23–25 where we’ll be showcasing a new and revolutionary data center security solution designed to help businesses prevent advanced attacks.
The term “traditional security” has gone through much transformation within the past couple of years, with next-gen security solutions arguing that security vendors with decades of experience have been doing security wrong. With machine learning heralded as the future of security, many businesses are left perplexed by a marketing conflict that solves none of their problems.
Last Friday (April 14, 2017), just before Easter, an egg was laid by The Shadow Brokers, a group that hopped into the spotlight in mid-2016. This time, the group dropped an especially colorful release, in the form of Eternalblue.
Recent surveys have revealed that 34 percent of companies have been breached in the past 12 months alone, with 74 percent of IT decision makers claiming they have little to no clue as to how the breach occurred.
From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.
With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.
A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities has been found by security researchers, potentially used to carry code injection attacks that would go completely unnoticed by traditional security software.
Note: This article was developed in collaboration with Marc Trouard-Riolle, Principal Product Marketing Manager, Citrix Systems Inc.
The cloud will most commonly be used in a hybrid manner by 2020, according to a Gartner report, emphasizing that operating entirely off the cloud will largely disappear by the end of the decade.
Recent cybersecurity incidents have left organizations and companies struggling to implement the necessary resources to minimize IT risks, regardless of how much security budgets have increased. More than 71 percent of organizations fear zero-day attacks and strongly believe they’re the most serious threats, and over 74 percent believe that it’s likely and very likely that their organization will be hit by an APT (Advanced Persistent Threat).