Explore the boundaries of the human element with Bitdefender at RSA 2020
One year back, Bitdefender was featured in Dark Reading’s series Cybersecurity and the Human ...
Majority of Developers are Concerned over the state of Their Application Security
While software developers are showing signs of high apprehension when it comes to the ...
Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild
New remote memory corruption vulnerability in Internet Explorer browsers allows for full ...
Cyber Security Skills Gap is Becoming More of a Chasm
Every cyber security executive knows—or should know—that the current demand for skills is ...
Gaming Became Industry Most Affected by DDoS Attacks in 2019
Any organization with an online footprint is always exposed to DDoS (distributed ...
The 'Grass-is-Greener' Syndrome of Modern SOCs
While most enterprises recognize the critical role that security operation centers (SOC) ...
How Does a Business Become a Champion in Cyber Resilience?
Cyber threats lurk behind every corner, in every industry and geography. From ...
The Protocol That's Putting Enterprise IoT At Extreme Risk
A protocol little known by executives outside of the networking world may put the future ...
How to Mitigate the Most Common Cloud Vulnerabilities
The US National Security Agency (NSA) has published an important document outlining the main ...
IT Auditors in the Spotlight
IT auditors—the people who conduct examinations of the management controls within an ...
How One Company Rebuffed Its Ransomware Aggressors and Froze Their $1M Bitcoin Wallet
A Canadian insurance company that fell victim to ransomware last year has managed to obtain ...
Run-Up to the Tokyo Olympics - Teleworking Threats in the Security Spotlight
Earlier this week, police in Japan launched what was described as a "three day ...


