Comprehensive security – that which spans as many endpoint types used by an organizations as possible – can be a challenge. With BYOD initiatives, virtualization, and public cloud, the variety of endpoints, which contain or have access to corporate data, is increasing.
All about Virtualization and Cloud Security | Recent Articles:
The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert over the last decade for breach events that threaten consumer privacy due to the negligence of businesses.
There is a lot of talk about “cloud security”, but that simple phrase can mean many things. In general, we should split the conversation between: 1) security for cloud, and 2) security from the cloud. Within the latter, there are distinctions.
VMworld USA is one of the largest events infrastructure and operations (and security) people look forward to every year in San Francisco. With this year’s theme “Ready For Any”, it is definitely a reflection of what we are doing at Bitdefender: we ARE ready for ‘any’ and protect it all in ‘one’.
The years come and go, and the names of the security researchers shift around year to year, as do the form factors and devices where the vulnerabilities reside that
Revelations by security researchers this week are showing just how prevalent malicious advertising, better known as malvertising, has grown on the biggest publishing sites on the web. According to reports out from Black Hat, this year has seen nearly a three-fold
Threat modeling helps enterprises manage risks more effectively and efficiently
Financial services companies have the most urgent need for safer payment methods as their clients demand privacy, security and convenience in all transactions, according to FIDO (Fast IDentity Online) Alliance