U.S. Signals Sanctions for Cyber Attacks, but Questions Remain
Recently the U.S. government added a tool to the toolset it can use against those who attack ...
MRIs Prove Security Warnings Push Our Brains' Pause Buttons
Perhaps the poor users have been maligned for all these years after all. Security pundits ...
Ensuring Security in the VDI Environment
Virtual desktop infrastructure (VDI) and the concept of desktop virtualization have become a ...
Enterprises Hold High Authentication Hopes for Software-Defined Perimeters
As we head into RSA next month, chances are high that software defined perimeter (SDP) will ...
Ho Hum… Another Data Breach
For casual observers and security experts alike, the past year or so has seen big-time data ...
A Thank You to Our Readers
Today marks the 1 Year Anniversary of this Bitdefender blog.
The Internet of Things is going to require a maniacal focus on availability and security
The Internet of Things is quickly moving from hyped concept to reality – and it’s proving to ...
Security as a Business Enabler: The Long View, from the trenches
Much has been said in the last five years about how security “needs a seat at the business ...
For Cloud Providers, Security Must Remain a High Priority
In this final installment in our series on security issues and vulnerabilities in a variety ...
Insurance Companies Need Strong Security Policies - and Technology
Many insurance companies are offering coverage for data breaches, and indeed a growing ...
An Overview of Virtualization Security Guidance: Part II
In the first post of this two-part series, I described security guidance regimes and tools ...
Telecommunications Industry: Calling for Security Help?
Telecommunications is one of those industries that many people take for granted—until ...


