Apr 14, 2015

U.S. Signals Sanctions for Cyber Attacks, but Questions Remain

Recently the U.S. government added a tool to the toolset it can use against those who attack ...

Apr 07, 2015

MRIs Prove Security Warnings Push Our Brains' Pause Buttons

Perhaps the poor users have been maligned for all these years after all. Security pundits ...

Ensuring Security in the VDI Environment

Virtual desktop infrastructure (VDI) and the concept of desktop virtualization have become a ...

Enterprises Hold High Authentication Hopes for Software-Defined Perimeters

As we head into RSA next month, chances are high that software defined perimeter (SDP) will ...

Mar 23, 2015

Ho Hum… Another Data Breach

For casual observers and security experts alike, the past year or so has seen big-time data ...

Mar 12, 2015

A Thank You to Our Readers

Today marks the 1 Year Anniversary of this Bitdefender blog.

The Internet of Things is going to require a maniacal focus on availability and security

The Internet of Things is quickly moving from hyped concept to reality – and it’s proving to ...

Security as a Business Enabler: The Long View, from the trenches

Much has been said in the last five years about how security “needs a seat at the business ...

Feb 27, 2015

For Cloud Providers, Security Must Remain a High Priority

In this final installment in our series on security issues and vulnerabilities in a variety ...

Insurance Companies Need Strong Security Policies - and Technology

Many insurance companies are offering coverage for data breaches, and indeed a growing ...

An Overview of Virtualization Security Guidance: Part II

In the first post of this two-part series, I described security guidance regimes and tools ...

Telecommunications Industry: Calling for Security Help?

Telecommunications is one of those industries that many people take for granted—until ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW