Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

How should businesses respond to the TechCrunch hack?

Jul 27 by Graham Cluley

If it can happen to a website as popular as TechCrunch, it might happen to you too.

Read More

How a serious data breach may drive a company out of business

Jun 27 by Razvan Muresan

The most serious financial consequence to companies that suffer a data breach is lost business: both direct costs – i.e. engaging forensic experts, hiring a law firm, offering victims’ identity protection services -, and indirect costs – such as the time, effort and organizational resources spent during the data breach resolution, loss of goodwill and customer churn. The total cost of a data breach has risen by almost a third since 2013, meaning that a serious breach may eventually ruin a business.

Read More

FBI: Businesses lost $3.1 billion in email ‘impersonation’ scams

Jun 24 by Razvan Muresan

Total losses caused by Business Email Compromise (BEC), a sophisticated scam targeting businesses working with foreign suppliers and businesses that regularly pay by wire transfer, have grown 13-fold since January in identified exposed losses, reaching over $3 billion, FBI says.

Read More

CEO salaries should be linked to their firm’s cyber security, says UK parliament

Jun 22 by Graham Cluley

Should the salaries of CEOs be linked to how well their company has protected itself against security threats?

British MPs certainly seem to think so.

Read More

Companies Urged to Adopt Newest Technologies to Fight Advanced Threats, Gartner Says

Jun 21 by Razvan Muresan

As the threat landscape evolves, security vendors try to launch breakthrough technologies to help companies protect their data and their customers from sophisticated attacks that inflict significant losses of both money and reputation.

Read More

Proof of concept research on hypervisor allows for easy encryption key exfiltration

Jun 09 by Bogdan Botezatu
Read More

Hypervisor Introspection Redefines Security for Virtualized Environments

Jun 06 by Viorel Canja

From 1960s mainframes to today’s cloud-centric evolution, data centers have undergone tremendous transformation. As applications became mission-critical, and desktop servers moved into formal data centers, the number of physical servers in a data center grew exponentially, making the job of managing this environment increasingly complex and expensive.

Read More

Aerospace firm loses $47 million in cyber fraud, fires CEO

May 27 by Graham Cluley

Have you trained your employees to be on the lookout for bogus emails?

I don’t mean the typical malicious emails that fill our inboxes every day, claiming to be phony fax machine notifications or bogus invoices.

Read More

How to detect targeted attacks by using memory introspection

May 24 by Razvan Muresan

Cybercriminals can spend months inside organizations, storing away information for a future attack or piecing data together that will get them to the prize they are after. They will also create measures to protect themselves from detection. Sometimes they create diversionary tactics to draw your attention away from what they are doing and where they have succeeded, as EY’s Global Information Security Survey 2015 shows. Cyberattacks impact both business decisions, mergers/acquisitions and competitive positions.

Read More

The Internet of Things: Big Opportunity, Huge Security Challenge

May 18 by Shaun Donaldson

One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly hype for sure, but IoT is nevertheless something all IT and security executives should be learning about, if not actually focusing on as a corporate strategy.

Read More

Blitzkrieg Attacks and Employees, Companies’ Top Security Concerns, Confirming Bitdefender's 2016 Predictions

May 11 by Razvan Muresan

Cyber attacks involving destructive malware will become a bigger problem for organizations. A growing trend in cyber attacks has been the unleashing of destructive malware such as Cryptolocker and Shamoon. Only 38 percent of respondents in a recent survey by Ponemon Institute they have a strategy to deal with destructive software.

Read More

IoT = Internet of Threats

May 05 by Catalin Cosoi

The Internet of Things will soon become the biggest vector of attacks on companies, as the number of connected devices is set to reach between 20 billion and 50 billion units by 2020.

Read More

Cloud Security

Subscribe to Blog Updates

Posts by Categories

Latest Tweets