Jan 29, 2021

BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users

Fraudsters found a way during the recent holiday season to take advantage of users' "Out of ...

Looking for an alternative to Symantec Endpoint Protection?

“There are far better things ahead than any we leave behind.”  C.S. Lewis

Jan 25, 2021

Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats

Financial services firms are major targets of cyber attacks A recent report describes six ...

Jan 25, 2021

The 2020 Year in Cybersecurity Review

When it came to healthcare security, 2020 proved to be a continuation of the state of ...

Jan 22, 2021

If the US President Can’t Secure His IoT Devices, Can You?

People’s homes are full of cameras and microphones, which in theory allow attackers to do ...

Jan 20, 2021

Q&A: Discussing Bitdefender Business Solutions Group’s Growing Momentum

Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part ...

Jan 15, 2021

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

IoT manufacturers often favor speed of rollout over security Attackers don’t have to work ...

Jan 14, 2021

Pandemic’s Impact on Cyber Security is Far Reaching

An overwhelming majority of business and technology executives worldwide plan to shift their ...

Jan 06, 2021

Three Security Headaches in 2021 and the Technologies to Fix Them

Remote workers have become lucrative ground for lurking cybercriminals Scams purporting to ...

Jan 05, 2021

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans IT leaders in ...

Jan 04, 2021

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, ...

Jan 03, 2021

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Not enough organizations are continuously looking for risks in their IT assets. ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware