Recent surveys have revealed that 34 percent of companies have been breached in the past 12 months alone, with 74 percent of IT decision makers claiming they have little to no clue as to how the breach occurred.
All about Virtualization and Cloud Security | Recent Articles:
When it comes to the business of information security, and the big technology trends that will likely shape the year ahead, the RSA Conference is perhaps the most important event of the year. And with a record attendance of more than 43,000, this year was no exception.
This year’s leading security conference, RSA, takes place February 13-17 in San Francisco, California, where the world’s best security researchers will present the findings of their latest research against cybercrime.
From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.
With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.
Predictions are never easy, and they are seldom right or very useful: but they are always fun. And as the holiday season is upon us and the New Year approaches so does the time of year reflection and, you guessed it: cybersecurity predictions.
There’s no doubt that enterprise environments are growing more complex by the day. Just consider the fluid nature of cloud computing and virtualization, the increase in the number of workloads, applications, and types of applications, coupled with the fact that they are distributed among on-premises and various types of cloud, and the explosion of mobile and accelerated adoption of IoT in recent years.
Most every business that is embracing DevOps methodologies is also deploying containers – or thinking about deploying containers. Currently, according to this story in Betanews, there are more than 100 products that currently use containers in agile development and they represent $1.7 billion in venture funding. “Eighty-eight percent of enterprises say they're shifting to a DevOps strategy, and containers are changing the nature of DevOps and transforming infrastructure,” Betanews reports.
A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities has been found by security researchers, potentially used to carry code injection attacks that would go completely unnoticed by traditional security software.
Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.
With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.
As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.