Aug 29, 2019

Financial Services: State of Software Security

As we’ve recently covered, cybersecurity in financial services is having a challenging time ...

Aug 28, 2019

The changing of the guard in the 2019 Gartner EPP MQ and why Bitdefender moved up

Gartner has once again included Bitdefender in the 2019 Magic Quadrant for Endpoint ...

Aug 26, 2019

The Cloud Security Alliance’s Top Threats to Cloud Computing

Periodically the Cloud Security Alliance publishes a report of the top threats to cloud ...

Aug 22, 2019

How to Prepare for Data Breach Notifications under GDPR

The Ireland-based Data Protection Commission (DPC), the supervisory authority for the ...

Aug 21, 2019

GAO: US Federal Agencies Need to Fully Establish Risk Management Programs

There have been plenty — too many — breaches involving federal agencies over the years. Way ...

Aug 16, 2019

When it Comes to Application Security, Banks Pay Little Interest

One might think financial institutions, such as banks, would have formidable levels of ...

Aug 14, 2019

How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2

This is the second of a two-part series of blog posts covering the challenges of securing ...

Aug 13, 2019

Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses

Legacy security designed to protect physical endpoints is no match for software-defined ...

Aug 12, 2019

UK Fines Jump Since GDPR Implementation

Commercial law firm Reynolds Porter Chamberlain LLP says that the average fine levied by the ...

Aug 09, 2019

Grappling with the Security Talent Shortage? Maybe Automation Can Help

It’s an issue that gnaws at many cyber security executives perhaps as much as the latest ...

Aug 07, 2019

15 Hot Tools To Come Out of Black Hat and Def Con

Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this ...

Aug 06, 2019

Protecting Against SWAPGS Attack with Bitdefender Hypervisor Introspection

Speculative execution-based attacks exploit CPU architecture flaws to allow attackers to ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW