Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

The dark side of the cloud: improper sharing and access, most cloud-related security incidents, study shows

Aug 22 by Razvan Muresan

With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.

Read More

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

Aug 11 by Razvan Muresan

As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.

Read More

Information Security Spending To Reach the $80-Billion-a-Year Threshold in 2016. IT Outsourcing and DLP, Main Drivers

Aug 09 by Razvan Muresan

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to Gartner’s recent forecast.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More

Questions Boards Can Ask Management Once a Cyber Breach Is Found

Jul 18 by Razvan Muresan

Since almost two-thirds of managers surveyed by Gartner say IT risk management data influences decisions at the board level, boards started to admit the importance of their direct involvement once a breach is found and business results are at risk. However, since decisions on the incident response plan have to be fast, board members need to see the big picture and ask the proper questions.

Read More

The State of Open Source in the Software Supply Chain

Jul 14 by George V. Hulme

Open source supply chain automation vendor Sonatype released its State of the Software Supply Chain Report this week. Sonatype assembled a significant amount of data on the use of open source software in development environments from 3,000 organizations across 25,000 applications. 

Read More

Research Report: Security Breaches are Becoming More Costly

Jul 11 by Razvan Muresan

As if it’s not bad enough that security breaches are constantly in the news and the sophistication of attacks is growing, the cost of intrusions continues to rise. Perhaps the only positive to draw from that development is that it increases the argument for more stringent security programs.

Read More

Cloud Use Will Mostly Be Hybrid by 2020, Gartner expects

Jul 01 by Razvan Muresan

The cloud will most commonly be used in a hybrid manner by 2020, according to a Gartner  report, emphasizing that operating entirely off the cloud will largely disappear by the end of the decade.

Read More

Hypervisor Introspection: Fighting APTs in Business Environment – Part 2

Jun 23 by Liviu Arsene

Since nothing that’s being executed in raw memory is encrypted – just scrambled – APTs that try to execute malicious code on a machine will be intercepted by HVI long before they actually compromise the operating system. In fact, as soon as the malicious code, even delivered via zero-day exploit, tries to execute in the VMs memory, the introspection engine will immediately “see” the malicious action and the code that was trying to be executed.

(back to reading part 1)

Read More

Hypervisor Introspection: Fighting APTs in Business Environment – Part 1

May 24 by Liviu Arsene

Recent cybersecurity incidents have left organizations and companies struggling to implement the necessary resources to minimize IT risks, regardless of how much security budgets have increased. More than 71 percent of organizations fear zero-day attacks and strongly believe they’re the most serious threats, and over 74 percent believe that it’s likely and very likely that their organization will be hit by an APT (Advanced Persistent Threat).

Read More

How Data Centers Can Be Energy Efficient, High Performing and Secure

Mar 15 by Bob Violino

Organizations are continually striving to make their data centers more energy efficient, while at the same time ensuring high performance and strong security. This can be a challenge for CIOs and data center administrators—to say the least. But it’s an important goal in a business environment that calls for efficient IT operations, rapid response to end-user and customer demand for processing and the protection of critical information resources against intrusions.

Read More

Bitdefender Launches New GravityZone to Bolster Enterprise Defense and Productivity

Corporate security leaps ahead with centralized scanning for endpoints, Exchange security, seamless deployment

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets