"Unauthorised code" on Juniper firewalls gives attackers admin access, decrypts VPN traffic
With many companies shutting down for the holidays, chances are that the IT team at your ...
Are employees’ smartphones putting your business at risk?
The shift toward using personal computing devices (laptops, tablets, smartphones and now ...
Study Shows that Organizations are Putting More Money, Senior Management Focus into Cyber Security
The latest “State of Information Security Survey” from consulting firm PcW sheds some new ...
Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies
With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what ...
Worst-case scenario: state-sponsored attackers hack your company
CIOs and CISOs face each day the fear of internal and external threats from criminal ...
Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance
Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to ...
The ultimate layer of enterprise protection: cybersecurity insurance
Six in 10 companies have purchased cybersecurity insurance in the past year, helping make ...
Future Linux Ransomware Ransacking the Internet
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...
BlackBerry believes in encryption backdoors - believes it's good for business
BlackBerry, once the darling of corporations the world over, is trying to rebuild itself and ...
CISOs’ transformation: from zeroes to heroes
Chief information security officers will become more important in companies’ hierarchies as ...
Air-Gapped Systems Vulnerable to Unconventional Hackers
Today’s interconnected world leaves everyone vulnerable to threats that can use the internet ...
An experienced leader is like a riverstone, embracing and empowering his team, Bitdefender founder says
In the early years of building a business, a key trait of a leader is passion. Later, the ...


