Nov 29, 2016

How to Develop a Face Recognition System Using Neuronal Networks

There is a lot of noise about artificial intelligence lately - plenty of controversy ...

Nov 24, 2016

Insecure IoT Devices find their way on Enterprise Networks

When the topic of IoT security comes up, it’s often considered a consumer security issue – ...

Nov 22, 2016

Risky Business: How Telecommunications Companies Are Dealing with Threats

Few industries have as broad an impact on other sectors and on society in general as ...

Half of US CIOs complain about insufficient network control, inability to monitor workloads across clouds

Some 47% of IT professionals are unable to monitor workloads across clouds, while 44% agree ...

Optimize security in an increasingly complex world

There’s no doubt that enterprise environments are growing more complex by the day. Just ...

Nov 17, 2016

We need IoT security standards, and we need them now!

Could IoT be missing the mark? To get real value out of this technology, companies and even ...

Outsider attack, the main cyber threat US companies are not prepared for

The main cyber threats companies are not prepared for are: outsider attack (43%), data ...

Nov 15, 2016

Cyber Security Spending Spree Expected to Continue

Recent industry research studies provide a clear sense of what’s happening in terms of cyber ...

Security of data in transit, the main security concern of CIOs who migrate data to hybrid cloud

Companies are slowly joining the bandwagon with hybrid cloud adoption, but Gartner estimates ...

The significant impact of containers on security

Most every business that is embracing DevOps methodologies is also deploying containers – or ...

The dark side of virtualization: two in three IT decision makers in the US fear job loss caused by security breaches

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in ...

Must cybersecurity inhibit innovation?

It’s absolutely true that, more often than not, security is a barrier to getting things ...

Unpatchable Windows AtomBombing Attack Plugged By Hypervisor Introspection

A new type of attack using a legitimate Windows mechanism rather than code vulnerabilities ...

Cloud Spending Spurs Security Spending Increase

As enterprises increasingly embrace cloud computing and cloud services, they must also ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW