<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Business Insights Cybersecurity Blog by Bitdefender</title><description>Stay in touch with the latest business cybersecurity news and information provided by Bitdefender Enterprise. Tune up your security knowledge and read our blog!</description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Business Insights Cybersecurity Blog by Bitdefender</title><link>https://www.bitdefender.com/en-gb/blog/businessinsights/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Fri, 13 Mar 2026 02:16:31 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-gb/rss/businessinsights/virtualization-data-center-security/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Operational Threat Intelligence – A Crucial Tool For Cyber Resilience</title><description><![CDATA[Cyber Security is paramount in modern business as attacks are constantly evolving and finding new ways to exploit vulnerabilities. To help combat these cyber threats, organizations and security professionals must expand their knowledge base and regularly adapt to the changing environment.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/operational-threat-intelligence-a-crucial-tool-for-cyber-resilience</link><guid isPermaLink="false">78728430707</guid><category><![CDATA[Virtualization & Data Center Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Shanice Jones</dc:creator><pubDate>Thu, 28 Jul 2022 09:58:34 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/TI_Operational_CristinaShanice.jpg" medium="image"/><content:encoded><![CDATA[Cyber Security is paramount in modern business as attacks are constantly evolving and finding new ways to exploit vulnerabilities. To help combat these cyber threats, organizations and security professionals must expand their knowledge base and regularly adapt to the changing environment.
]]></content:encoded></item><item><title>Bitdefender and Amazon Web Services Strengthen Cloud Security</title><description><![CDATA[It’s no secret that cloud computing is growing rapidly. Over the past several years, organizations of all sizes and across all industries have been increasingly adopting cloud technologies to experience benefits such as increased efficiency, ability to rapidly deploy new applications and services, improved scalability, and more. Then, in 2020, the global pandemic hit and the world was thrust into remote work and learning. Organizations were forced to rapidly accelerate their digital transformation initiatives and began swiftly deploying new cloud-based technologies to support remote work and collaboration.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-and-amazon-web-services-strengthen-cloud-security</link><guid isPermaLink="false">79821176110</guid><category><![CDATA[Cloud Security]]></category><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Bitdefender Enterprise</dc:creator><pubDate>Tue, 26 Jul 2022 13:00:15 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/AWS_CWS.jpg" medium="image"/><content:encoded><![CDATA[It’s no secret that cloud computing is growing rapidly. Over the past several years, organizations of all sizes and across all industries have been increasingly adopting cloud technologies to experience benefits such as increased efficiency, ability to rapidly deploy new applications and services, improved scalability, and more. Then, in 2020, the global pandemic hit and the world was thrust into remote work and learning. Organizations were forced to rapidly accelerate their digital transformation initiatives and began swiftly deploying new cloud-based technologies to support remote work and collaboration.
]]></content:encoded></item><item><title>GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads</title><description><![CDATA[As enterprises shift towards a cloud-first digital environment, the need to address an increased attack surface and new threats continues to rise. An organization’s use of cloud infrastructure promises efficiency and speed for a company's team of developers.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/gravityzone-and-nutanix-ahv-how-bitdefender-promotes-security-efficiency-for-cloud-workloads</link><guid isPermaLink="false">74135631533</guid><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Cloud Security]]></category><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Josue Ledesma</dc:creator><pubDate>Tue, 31 May 2022 10:32:13 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/Nutanix_Josue.jpg" medium="image"/><content:encoded><![CDATA[As enterprises shift towards a cloud-first digital environment, the need to address an increased attack surface and new threats continues to rise. An organization’s use of cloud infrastructure promises efficiency and speed for a company's team of developers.
]]></content:encoded></item><item><title>Combatting Ransomware as a Service (RaaS)</title><description><![CDATA[Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware incident caused more than just business disruption - it inflicted considerable economical damage, reminding us how fragile our digital infrastructure is.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/combatting-ransomware-as-a-service-raas</link><guid isPermaLink="false">53264545123</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Cloud Security]]></category><category><![CDATA[Virtualization & Data Center Security]]></category><category><![CDATA[Privacy and Data Protection]]></category><category><![CDATA[Cybersecurity Awareness]]></category><dc:creator>Andrei Pisau</dc:creator><pubDate>Thu, 19 Aug 2021 19:29:45 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/Screen%20Shot%202021-08-19%20at%201.38.43%20PM_smaller-2.png" medium="image"/><content:encoded><![CDATA[Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware incident caused more than just business disruption - it inflicted considerable economical damage, reminding us how fragile our digital infrastructure is.
]]></content:encoded></item><item><title>The Five Biggest Challenges in Healthcare Security Right Now</title><description><![CDATA[The healthcare industry is in the midst of tremendous change. And it comes from the pressure to modernize aging systems, the continued shift to cloud computing, as well as the rapid adoption of telemedicine and electronic medical records. And all during a time of an ongoing pandemic and the continuous targeting of healthcare systems by cybercriminal.]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/the-five-biggest-challenges-in-healthcare-security-right-now</link><guid isPermaLink="false">53092653374</guid><category><![CDATA[Virtualization & Data Center Security]]></category><category><![CDATA[Managed Detection and Response]]></category><dc:creator>George V. Hulme</dc:creator><pubDate>Wed, 18 Aug 2021 10:53:32 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/pexels-pixabay-159211_ALT.jpg" medium="image"/><content:encoded><![CDATA[The healthcare industry is in the midst of tremendous change. And it comes from the pressure to modernize aging systems, the continued shift to cloud computing, as well as the rapid adoption of telemedicine and electronic medical records. And all during a time of an ongoing pandemic and the continuous targeting of healthcare systems by cybercriminal.]]></content:encoded></item><item><title>Anti-Exploit Technology is Fundamental for Cloud Workload Security</title><description><![CDATA[
All attacks include malicious activity, but not all attacks include writing malware to disk 
Anti-exploit technology prevents attackers from gaining a foothold 
What to look for in anti-exploit technology 

Attacks, exploits and vulnerabilities 
Any complete cloud workload security stack must feature robust anti-exploit technology for both end-user and server systems. Cloud workloads run on servers, either on-premises or in the cloud, and end-user systems access those workloads. End-user systems can give attackers indirect access to workload data, while servers can provide more direct access if attackers achieve a foothold.  
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/anti-exploit-technology-is-fundamental-for-cloud-workload-security</link><guid isPermaLink="false">44276792460</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Shaun Donaldson</dc:creator><pubDate>Thu, 01 Apr 2021 11:29:38 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/pexels-panumas-nikhomkhai-1148820.jpg" medium="image"/><content:encoded><![CDATA[
All attacks include malicious activity, but not all attacks include writing malware to disk 
Anti-exploit technology prevents attackers from gaining a foothold 
What to look for in anti-exploit technology 

Attacks, exploits and vulnerabilities 
Any complete cloud workload security stack must feature robust anti-exploit technology for both end-user and server systems. Cloud workloads run on servers, either on-premises or in the cloud, and end-user systems access those workloads. End-user systems can give attackers indirect access to workload data, while servers can provide more direct access if attackers achieve a foothold.  
]]></content:encoded></item><item><title>Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection</title><description><![CDATA[
Bitdefender contributes unique technology to the open-source community 
Hypervisor-based Memory Introspection (HVMI) is a sub-project of Xen Project 
We continue commercial support of GravityZone Hypervisor Introspection  

Bitdefender Hypervisor Introspection has been in a class of its own since the solution was launched. The gist of it is this – get ahead of the results of an attack (malware in general; ransomware being a timely example) by using APIs within hypervisors – based on CPU instructions - to gain access to raw memory events within running virtual machines and apply security logic by taking advantage of the role of hypervisors in the workload stack to stop attacks. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-releases-landmark-open-source-software-project-hypervisor-based-memory-introspection</link><guid isPermaLink="false">33069551152</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Shaun Donaldson</dc:creator><pubDate>Thu, 30 Jul 2020 14:48:22 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/hvmi3.png" medium="image"/><content:encoded><![CDATA[
Bitdefender contributes unique technology to the open-source community 
Hypervisor-based Memory Introspection (HVMI) is a sub-project of Xen Project 
We continue commercial support of GravityZone Hypervisor Introspection  

Bitdefender Hypervisor Introspection has been in a class of its own since the solution was launched. The gist of it is this – get ahead of the results of an attack (malware in general; ransomware being a timely example) by using APIs within hypervisors – based on CPU instructions - to gain access to raw memory events within running virtual machines and apply security logic by taking advantage of the role of hypervisors in the workload stack to stop attacks. 
]]></content:encoded></item><item><title>Security Must Adjust as SDN Goes Mainstream</title><description><![CDATA[After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on the cusp of big breakthroughs. So say the results of the new research from Enterprise Management Associates (EMA).
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/security-must-adjust-as-software-defined-networking-goes-mainstream</link><guid isPermaLink="false">5793870164</guid><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Cloud Security]]></category><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Ericka Chickowski</dc:creator><pubDate>Fri, 25 May 2018 08:05:03 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/servers.png" medium="image"/><content:encoded><![CDATA[After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on the cusp of big breakthroughs. So say the results of the new research from Enterprise Management Associates (EMA).
]]></content:encoded></item><item><title>Coin Miner Reports Outrank Ransomware by Two Orders of Magnitude, According to Bitdefender Telemetry</title><description><![CDATA[Bitdefender telemetry revealed that from September 2017 until February 2018, ransomware reports have followed a descending curve, while coin miner reports have increased by 130 percent by January 2018. Interestingly, cryptojacking is currently one of the fastest spreading cyber threats, already outranking ransomware’s exposure by a factor of 1 to 100 according to Bitdefender’s intelligence, and is recently displaying targeted behavior, by leveraging fileless techniques and exploits to infiltrate organizations and spread laterally.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/coin-miner-reports-outrank-ransomware-by-two-orders-of-magnitude-according-to-bitdefender-telemetry</link><guid isPermaLink="false">5659437603</guid><category><![CDATA[Virtualization & Data Center Security]]></category><category><![CDATA[Threat Research]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Tue, 27 Mar 2018 11:26:38 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/Coin_Miner_Reports_Outrank_Ransomware_by_Two_Orders_of_Magnitude,_According_to_Bitdefender_Telemetry.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender telemetry revealed that from September 2017 until February 2018, ransomware reports have followed a descending curve, while coin miner reports have increased by 130 percent by January 2018. Interestingly, cryptojacking is currently one of the fastest spreading cyber threats, already outranking ransomware’s exposure by a factor of 1 to 100 according to Bitdefender’s intelligence, and is recently displaying targeted behavior, by leveraging fileless techniques and exploits to infiltrate organizations and spread laterally.
]]></content:encoded></item><item><title>Alleged North Korean Threat Actor Targets Select Victims with another Critical Zero-Day Vulnerability Attack</title><description><![CDATA[Attributing cyberattacks and advanced malware to a particular country or entity is usually troublesome. Forensic artefacts can sometimes be planted or forged to point to a specific country or cybercriminal group.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/alleged-north-korean-threat-actor-targets-select-victims-with-another-critical-zero-day-vulnerability-attack</link><guid isPermaLink="false">5646228026</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Mon, 19 Mar 2018 16:00:00 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/Alleged_North_Korean_Threat_Actor_Targets_Select_Victims_with_another_Critical_Zero_Day_Vulnerability_Attack-2-1.jpg" medium="image"/><content:encoded><![CDATA[Attributing cyberattacks and advanced malware to a particular country or entity is usually troublesome. Forensic artefacts can sometimes be planted or forged to point to a specific country or cybercriminal group.
]]></content:encoded></item><item><title>Debunking Software Defined Data Center Myths</title><description><![CDATA[The global software defined data center (SDDC) market is estimated to reach US$90.416 billion by 2022, from US$36.517 billion in 2017, meaning that companies will continue on the path of software defined everything. While the immediate benefits of SDDCs revolve around less CapEx, OpEx, centralized management, and the deployment of cloud in a box, organizations need to prepare for challenges facing when adhering to SDDCs.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/debunking-software-defined-data-center-myths</link><guid isPermaLink="false">5604380483</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Mon, 05 Mar 2018 08:15:16 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/debunking-software-defined-data-center-myths.jpg" medium="image"/><content:encoded><![CDATA[The global software defined data center (SDDC) market is estimated to reach US$90.416 billion by 2022, from US$36.517 billion in 2017, meaning that companies will continue on the path of software defined everything. While the immediate benefits of SDDCs revolve around less CapEx, OpEx, centralized management, and the deployment of cloud in a box, organizations need to prepare for challenges facing when adhering to SDDCs.
]]></content:encoded></item><item><title>SCMagazine’s Innovator Award for Bitdefender Hypervisor Introspection Marks Solution Milestone</title><description><![CDATA[Bitdefender Hypervisor Introspection recently won the SCMagazine Innovator Award, marking the fact that truly groundbreaking security technologies have started to receive validation from the market, as traditional security solutions fail to cope with the ever-increasing complexity of advanced threats.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/scmagazines-innovator-award-for-bitdefender-hypervisor-introspection-marks-solution-milestone</link><guid isPermaLink="false">5539021088</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Thu, 25 Jan 2018 10:15:37 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/scmagazines-innovator-award-for-bitdefender-hypervisor-introspection-marks-solution-milestone-1.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender Hypervisor Introspection recently won the SCMagazine Innovator Award, marking the fact that truly groundbreaking security technologies have started to receive validation from the market, as traditional security solutions fail to cope with the ever-increasing complexity of advanced threats.
]]></content:encoded></item><item><title>Nutanix Your Way to VDI Xen with Bitdefender</title><description><![CDATA[In the technology world, it is rare that three uniquely positioned vendors converge to provide a common solution which addresses security, performance, and operational benefits as Bitdefender, Citrix, and Nutanix have around Virtual Desktop Infrastructure (VDI).
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/nutanix-your-way-to-vdi-xen-with-bitdefender</link><guid isPermaLink="false">5503267070</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Shaun Donaldson</dc:creator><pubDate>Fri, 05 Jan 2018 14:27:26 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/Blog_pics/nutanix-citrix-vdi-done-right-blog-header.jpg" medium="image"/><content:encoded><![CDATA[In the technology world, it is rare that three uniquely positioned vendors converge to provide a common solution which addresses security, performance, and operational benefits as Bitdefender, Citrix, and Nutanix have around Virtual Desktop Infrastructure (VDI).
]]></content:encoded></item><item><title>Bitdefender Joins Xen Project Advisory Board</title><description><![CDATA[Bitdefender has been named an Advisory Board member for the Linux Foundation-hosted Xen Project formed of major cloud companies, virtualization providers, enterprises and silicon vendors that advise and support development of Xen Project software for cloud computing, embedded, IoT use-cases, automotive and security applications.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-joins-xen-project-advisory-board</link><guid isPermaLink="false">5482187753</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Mon, 18 Dec 2017 15:03:14 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/bitdefender-joins-xen-project-advisory-board.png" medium="image"/><content:encoded><![CDATA[Bitdefender has been named an Advisory Board member for the Linux Foundation-hosted Xen Project formed of major cloud companies, virtualization providers, enterprises and silicon vendors that advise and support development of Xen Project software for cloud computing, embedded, IoT use-cases, automotive and security applications.
]]></content:encoded></item><item><title>Bimodal Approach to IT Meets Digital Business Challenges – Coordinating Services, Not Controlling Assets</title><description><![CDATA[Businesses embracing agility and scalability as part of digitalization onboarding will have to adhere to hybrid compute and storage models based on multiple infrastructure as a service (IaaS) and platform as a service (PaaS) providers, according to Gartner's Strategic Roadmap for Datacenter Infrastructure report that can be downloaded here. With 10 percent of organizations closing off their on-premise data centers by the end of 2018, 80 percent of enterprises will adhere to IaaS and PaaS by 2019.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bimodal-approach-to-it-meets-digital-business-challenges-coordinating-services-not-controlling-assets</link><guid isPermaLink="false">5333285944</guid><category><![CDATA[Virtualization & Data Center Security]]></category><dc:creator>Liviu Arsene</dc:creator><pubDate>Tue, 12 Sep 2017 01:00:00 GMT</pubDate><media:content url="https://cdn2.hubspot.net/hubfs/341979/Blog_pics/09-2017/server-90389_1920.jpg" medium="image"/><content:encoded><![CDATA[Businesses embracing agility and scalability as part of digitalization onboarding will have to adhere to hybrid compute and storage models based on multiple infrastructure as a service (IaaS) and platform as a service (PaaS) providers, according to Gartner's Strategic Roadmap for Datacenter Infrastructure report that can be downloaded here. With 10 percent of organizations closing off their on-premise data centers by the end of 2018, 80 percent of enterprises will adhere to IaaS and PaaS by 2019.
]]></content:encoded></item></channel>
        </rss>