Subscribe to Email Updates

All about Virtualization and Cloud Security | Recent Articles:

Fight Back against Advanced Persistent Threats with Bitdefender Hypervisor Introspection, Showcased at RSA 2017

Feb 09 by Liviu Arsene

This year’s leading security conference, RSA, takes place February 13-17 in San Francisco, California, where the world’s best security researchers will present the findings of their latest research against cybercrime.

Read More

Bitdefender Hypervisor Introspection Fights Advanced Persistent Threats in Datacenters

Jan 26 by Liviu Arsene

From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.

Read More

Browser-Based Attack Proliferation Calls for New Security Approach

Jan 10 by Harish Agastya

With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.

Read More

The big cybersecurity trends that will likely continue through 2017

Dec 12 by George V. Hulme

Predictions are never easy, and they are seldom right or very useful: but they are always fun. And as the holiday season is upon us and the New Year approaches so does the time of year reflection and, you guessed it: cybersecurity predictions.

Read More

Optimize security in an increasingly complex world

Nov 18 by George V. Hulme

There’s no doubt that enterprise environments are growing more complex by the day. Just consider the fluid nature of cloud computing and virtualization, the increase in the number of workloads, applications, and types of applications, coupled with the fact that they are distributed among on-premises and various types of cloud, and the explosion of mobile and accelerated adoption of IoT in recent years.

Read More

The significant impact of containers on security

Nov 08 by George V. Hulme

Most every business that is embracing DevOps methodologies is also deploying containers – or thinking about deploying containers. Currently, according to this story in Betanews, there are more than 100 products that currently use containers in agile development and they represent $1.7 billion in venture funding. “Eighty-eight percent of enterprises say they're shifting to a DevOps strategy, and containers are changing the nature of DevOps and transforming infrastructure,” Betanews reports.

Read More

Unpatchable Windows AtomBombing Attack Plugged By Hypervisor Introspection

Nov 01 by Liviu Arsene

A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities has been found by security researchers, potentially used to carry code injection attacks that would go completely unnoticed by traditional security software.

Read More

Cloud use increases attack surface up to 100-fold; companies fail to keep up with flood of threats

Aug 24 by Razvan Muresan

Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.

Read More

The dark side of the cloud: improper sharing and access, most cloud-related security incidents, study shows

Aug 22 by Razvan Muresan

With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.

Read More

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

Aug 11 by Razvan Muresan

As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.

Read More

Information Security Spending To Reach the $80-Billion-a-Year Threshold in 2016. IT Outsourcing and DLP, Main Drivers

Aug 09 by Razvan Muresan

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to Gartner’s recent forecast.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More