About 80% of the new generations of automobiles will be connected to the internet by 2017, from 25 percent already, CEOs have started speaking publicly about smart cars, and developers admit the security challenges facing the new market.
All about Virtualization and Cloud Security | Recent Articles:
Auto Makers’ Strategy of Turning Cars into Four-wheel Smartphones will Bring Enterprise Security into Focus
The internet is without boundaries, borders, and rules, making it a perfect freedom of speech tool. It removes the physical distance between us to allow sharing of ideas between like-minded people, or exchanges of ideas between those who may not agree.
it-sa 2015: Virtualize all you want, but protect yourself intelligently against malware
At the IT Security Expo and Congress in Nürnberg last week, Bitdefender’s Cristian Avram tackled the hottest topics of the moment, virtualization and virtualization security, with a full house.
Breakthrough technologies and products such as BOX have tripled job applications at Bitdefender
Highly innovative products such as the recent IoT security solution Bitdefender BOX act as a magnet to valuable job applicants, increasing both the number and quality of candidates.
Businesses Warned of Router, Riddled with Security Holes and a Zero-day Exploit
When you buy a new piece of computer hardware, and connect it to your network, I really hope that you check whether there are any security updates available.
Each time we hear about a new security incident at a major company, we assume the breach succeeded either because of its high level of sophistication or because attackers have been “footprinting” their victim for a very long time and found the weakest link in the security chain.
Security impacts productivity: employees feel IT security is their worst enemy. How to change it?
A corporate security plan is meant to create policies that protect corporate assets and limit liability without harming efficiency. But companies often fail to find the right balance between security and user experience. As a result, security becomes an annoying antagonist that diminishes both enthusiasm and productivity and makes working remotely difficult.
How mature is your organization’s cyber security program? It’s a relevant question, especially considering how data breaches have become increasingly prevalent and more damaging for organizations.
Cloud Security
Virtualization Security
Subscribe to Blog Updates
Posts by Categories
- breach (2)
- BYOD (28)
- CIO (7)
- CISO (7)
- Cloud Security (114)
- connected care (1)
- credit card (2)
- cryptocurrency (3)
- cryptojacking (1)
- cryptomining (1)
- Cyber Security Awareness Month (5)
- cyber-attack (2)
- cybersecurity awareness (7)
- data breach (18)
- Data Protection (75)
- data protection act (2)
- datacenter (2)
- DevOps (9)
- Endpoint Protection & Management (14)
- Enterprise Security (398)
- Equifax (2)
- financial services (7)
- garter (1)
- GDPR (14)
- GDPR, Data Protection (2)
- General Data Protection Regulation (3)
- GiTEX (1)
- Healthcare (2)
- hyperconverged infrastructure (1)
- hypervisor (14)
- hypervisor introspection (10)
- identity theft (2)
- Industries (31)
- insider threats (3)
- Integration (2)
- IoT (3)
- IoT, Policy, security (6)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (3)
- malware, threats (5)
- memory introspection (12)
- Microsoft (1)
- Network Protection (9)
- ransomware (3)
- ransomware, HVI (3)
- report (1)
- Security as a Service (15)
- Security Threats (54)
- SMB Security (39)
- Software-defined-datacenter (4)
- Virtualization & Data Center Security (69)
- WDATP (1)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2018 (15)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)