38 percent of businesses have scaled infrastructure to meet new levels of demand during the lockdown period (March-June), highlighting how the pandemic has accelerated businesses’ digital transformation plans, according to Aptum. The findings also demonstrate that organizations that adopted cloud technologies prior to the pandemic have been best positioned to deal with the unprecedented crisis,…

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and store data. However, from a business security perspective, their highly accessible and portable nature makes them a complete nightmare, with data leakage, theft, and…

Protecting high-value research data from nation-state attackers

Joint NCSC-DHS-CISA advisories and a warning from the FBI have recently highlighted activities of nation-state-backed groups targeting organizations focused on COVID-19 research. The goal is to obtain information for their domestic COVID-19 research efforts. Security leaders at research organizations need to better understand the motivations and methods of these attackers. That will allow them to…

As the professional world moves increasingly online, Bitdefender announces the global launch of Bitdefender Digital Identity Protection, the service that lets freelancers, self-employed, consultants and even private individuals control their online reputation. Digital Identity Protection taps the award-winning security technology of Bitdefender, perfected over two decades of service in the fight against cybercrime, to let…

As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors rightly center around health and safety, but we must also acknowledge that all of us are still targets for cyberattacks. The new work-from-home world has poked countless holes in security perimeters, so…

10 security changes post-COVID-19

Back in March, I heard from several CISOs about how COVID-19 was disrupting their cybersecurity programs and changing their priorities. A few weeks later, I connected with some CISO friends, and got an update on phase 2 of their pandemic journeys. While no one knows when the coronavirus impact will end, we are getting a…

EfficientIP Cloud IPAM Sync: Improved control over applications hosted in multi-cloud environments

EfficientIP launched Cloud IPAM Sync, a new service that enables IT managers to improve control over applications hosted in multi-cloud environments. Cloud IPAM Sync uses DDI to provide central visibility and unified management over internal and cloud datacenters, thanks to real-time repository information. The cloud has become an attractive option for both enterprises and attackers….

As millions of employees continue to work from home for the foreseeable future and in some cases perhaps indefinitely, balancing the ongoing demands of employee productivity and information security will be paramount. The historical “castle and moat” model of protecting IT infrastructure is outdated and will be further challenged by the emergence of a new…

The attack surface of large enterprises has grown in recent months driven by the new work conditions imposed by the COVID-19 pandemic. The threat has increased in many areas including servers that are directly accessible from the internet, domain names, websites, web forms, certificates, third-party applications and components or mobile apps. While some of those…