Blockchain as an IoT Security Mechanism
Building more robust security for the growing Internet of Things (IoT) has been a focal ...
Forewarned is Forearmed: Boost Your Cyber Defenses with Threat Hunting
Intrusion detection, incident response, and digital forensics - these are all essential ...
Legal Sector Has a Big Problem with Intentional Data Breaches
The legal sector is a prime target for cybercriminals, and the vast majority of IT leaders ...
4 Million Passwords Tied to Fortune 1000 Companies Are Available on the Dark Web, Research Shows
A snapshot of the breach exposure of major enterprises has revealed 23 million pairs of ...
Are You Ready for Managed Detection and Response?
Security’s challenge is matching awareness of external threats to internal goals and the ...
Tips for Safe Videoconferencing from Home
Companies have been using videoconferencing applications for a long time, so the adjustment ...
As CIOs See Expanding Roles in Customer Experience, Security Must Keep Pace
Let’s face it: CIOs are quite busy as they drive forward with their digital transformation ...
Hackers Actively Exploiting Enterprise VPN Bugs Amid Covid-19 Telework Trend, says DHS
The Coronavirus pandemic has prompted numerous organizations to consider alternate ...
Forrester Wave for EDR 2020: Bitdefender 'the biggest EDR vendor you haven’t considered but should have'
Bitdefender, a leading global cybersecurity company protecting over 500 million systems ...
More Business Websites Hit by Credit-card Skimming Malware
In the last few days it has come to light that blender manufacturer NutriBullet and guitar ...
40% of Fortune 1000 Companies Will Suffer a Breach Every Year, New Research Suggests
Over 60% of the Fortune 1000 had at least one public breach over the last decade. Things ...
The New Generation of Cybersecurity Solutions: from Features to Outcomes
Today, businesses face a new set of challenges: more aggressive cyber threats (higher ...
Bitdefender blocks CVE-2020-0796 ‘EternalDarkness Bug’ at Network Level
A new vulnerability in the SMB protocol allows an unauthenticated attacker to run arbitrary ...
Infosec Pros Agree Human Skills Matter Most in a Cybersecurity Stack
Artificial Intelligence (AI) and Machine Learning (ML) offer considerable advantages for ...
5 Security Risks for Companies When Adopting Work from Home
Organizations and companies of all sizes have started adopting work-from-home practices to ...
As coronavirus spreads, attackers won’t let up on healthcare systems
As healthcare providers and public health agencies around the world find themselves pressed ...
Healthcare Cybersecurity (Part II) - Pernicious Threats and Their Ripple Effects
Cooperation between health professionals and IT staff has never been more important. The ...
The Protocol That's Putting Enterprise IoT At Extreme Risk
A protocol little known by executives outside of the networking world may put the future ...
Two-Thirds of Healthcare Organizations Have Suffered a Security Incident
The healthcare industry is among the most affected by security incidents, and new research ...
IT Leaders Aim to Outgun Hackers with Bigger Cybersecurity Budgets in 2020
More than half of IT professionals are extremely concerned about the security of corporate ...
Bitdefender Researchers Discover New Side-Channel Attack
This new speculative-execution-based attack exploits flaws in the CPU architecture to ...
Passwords Remain the Main Method of Authentication and Top Cause of Data Breaches
The username/password combo is still the dominant method of authentication used to access ...
Healthcare Providers Lose an Average $2.75 Million per Data Breach
More than half of healthcare vendors have suffered at least one breach of protected health ...
Why Is Targeted Ransomware So Dangerous?
The word “ransomware” strikes fear in the hearts of chief technical officers. Their impulse ...
Securing AI: The Next Gen of Enterprise Cybersecurity
Recently, a facial recognition vendor that consolidates billions of photos to fuel its ...
20% of People Caught in Data Breaches Suffer Financial Info Leaks
A wide range of information is lost in a data breach, starting from more innocuous things ...
Survey Shows Most Organizations Plan to Embrace Zero Trust, yet Remain Unconfident in Ability to Implement
One of the biggest weaknesses in any environment is maintaining effective authentication and ...
Cyberattack Fears Haunt State Employees More Than Natural Disasters and Terrorist Attacks
Fewer than one in four city employees receive cyber training related to ransomware threats ...


