Why CISOs Should Understand the Threat Landscape To Bolster Security in 2018
Doctors can’t prescribe proper treatment for patients without identifying and analyzing ...
Cloud use is growing, and your cloud security strategy must grow with it
Is this cloud security Nirvana? While many organizations moved to the cloud to try to ...
2018 is the year of GDPR and NIS compliance; enterprises still not ready
The deadline for full compliance with the European data protection law is right around the ...
Study Shows Organizations have Significant Misconceptions About the Responsibility for Data Management, Security and Privacy in the Cloud
The cloud has become a vital and well-entrenched component of the IT infrastructure at a ...
Cyber Warranties Could Be Next Big Service Provider Differentiator
As worries about third-party risks continue to press on the minds of technology ...
Is Your Data Safe from Quantum Supremacy?
Quantum computing may sound like science fiction, but it's coming down the pike faster than ...
Cloud Computing, Cybersecurity Top Investments for Government Cios in 2018
Government CIOs have a full agenda for 2018, including top investments in cloud services ...
No End in Sight for IoT Botnet Growth
When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an ...
Businesses rushing to adopt new tech are opening more doors to hackers – research
While modern technology makes possible new business models to drive growth and ...
Communication is key when responding to a cybersecurity incident
There’s an old joke that goes something like this: “To err is human, but to really screw ...
SCMagazine’s Innovator Award for Bitdefender Hypervisor Introspection Marks Solution Milestone
Bitdefender Hypervisor Introspection recently won the SCMagazine Innovator Award, marking ...
Leaky Buckets: 10 Worst Amazon S3 Breaches
The last year has proved out about security naysayers' warnings about the undisciplined use ...


