Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses
Legacy security designed to protect physical endpoints is no match for software-defined ...
UK Fines Jump Since GDPR Implementation
Commercial law firm Reynolds Porter Chamberlain LLP says that the average fine levied by the ...
Grappling with the Security Talent Shortage? Maybe Automation Can Help
It’s an issue that gnaws at many cyber security executives perhaps as much as the latest ...
15 Hot Tools To Come Out of Black Hat and Def Con
Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this ...
Protecting Against SWAPGS Attack with Bitdefender Hypervisor Introspection
Speculative execution-based attacks exploit CPU architecture flaws to allow attackers to ...
How to manage the headache of defending Industrial IT Infrastructures (Industrial IoT) – Part 1
This is the first of a two-part series of blog posts covering the challenges of securing ...
New Cyber Security Alliance Aims to Fight Back
There’s clearly a sense of combativeness building on the part of cyber security leaders, ...
Join Bitdefender at Black Hat 2019 for a Legendary Experience
*Update* 4PM PDT on 8/06/2018 - Bitdefender senior researchers Dan Horea Luțaș and Andrei ...
Fraudsters Are Trying to Steal $8.7 Million Every Single Day through Business Email Compromise
The Financial Crimes Enforcement Network (FinCEN), part of the US Department of the ...
New York Businesses Must Now Report a Breach Even if Private Data Was Merely ‘Viewed’
New York is joining other US states in expanding its definition of a data breach to include ...
Framework Aims to Enhance the Security of Software
Software is powering much of the world today, from the largest computing machines to the ...
Surprise: Healthcare Organizations Confident in Their Cybersecurity Efforts
Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security ...


