Sep 30, 2015

Detection and Response: The cybersecurity imperative

Let’s face it, when it comes to building a solid cybersecurity program, defense alone isn’t ...

Sep 29, 2015

Research Shows Business Executives Are Worried About Cyber Security—And With Good Reason

What worries business executives the most these days? Lots of things, but cyber security ...

Sep 29, 2015

How to Mitigate Human Errors for Better Data Security

If you asked any CIO to identify the one risk influencing all security incidents, the ...

Sep 24, 2015

Companies Don’t Know Location of Sensitive Data, How to Find Breaches

The inability to identify critical assets or data and to properly react to security breaches ...

Sep 22, 2015

IT Talent Creates Major Hub in the IT World in Central, Eastern Europe, Bitdefender founder says

The Central and Eastern European region has become a major IT hub, spurring the ...

Sep 22, 2015

Gartner on Security: You WILL Be Breached. So Make Sure Attackers Linger No Longer

At the Gartner Security and Risk Management Summit in London last week, Gartner’s Neil ...

Sep 21, 2015

Data Breaches and the Loss of Privacy

We’ve touched on the issue of online privacy in previous posts, but recent data breaches ...

Sep 18, 2015

Computer-controlled medical devices and healthcare industry under fire from cyberattacks

The healthcare industry has been reportedly under constant cyberattack, with 67 percent of ...

Sep 08, 2015

Small Business Owners Boost Security after Breaches Wreak Havoc

Small businesses’ concerns about cyber threats have shot up and the perceived risk will only ...

Sep 03, 2015

Endpoint antimalware: breaking down barriers to change

When working with organizations, the cost of replacing an incumbent endpoint antimalware ...

Sep 01, 2015

Wearables Add Yet Another Challenge for Corporate Security

Just when many corporate security and IT executives thought they were getting something of a ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware