Debunking The BlueKeep Exploit Hype – What You Should Know
WannaCry is still fresh in our memory, reminding organizations of how distractive an ...
Agentless Workload Security with GravityZone and NSX-T 2.4 Data Center
VMware NSX-T Data Center 2.4 release now includes Guest Introspection services via agentless ...
Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds
A few years ago, companies were reluctant to adopt cloud computing because they thought a ...
Security Must Adjust as SDN Goes Mainstream
After years of hype, 2018 may finally see the start of the mainstream adoption of ...
Loopholes in Cloud Security Exposed Online 50% of Corporate Databases
Cloud security has grown into a major issue for enterprises, as only one company in six ...
Some Organizations Pulling Workloads Back from the Cloud Because of Security, Data Management Concerns
Everyone in IT knows how much the cloud is becoming a central and strategic component of the ...
Shifting Gears to Cloud-Centric Cybersecurity
As enterprises bridge their adoption patterns for public cloud from isolated pilot projects ...
IT Security Pros Neglect The Past As Source For Fighting Future Threats
An increase in cyber threats and a failure to learn from past incidents place the security ...
1 in 50 Publicly Readable Amazon Buckets Are Also Writable – And That’s a Data Disaster Waiting to Happen
Now is not the time to dilly-dally. If you haven’t already properly secured the Amazon Web ...
Cybersecurity – A Top Risk Management Priority for Senior Execs, But Only On Paper
As bad actors continue to hone their skills and governments keep raising the penalty for ...
Cloud Computing, Cybersecurity Top Investments for Government Cios in 2018
Government CIOs have a full agenda for 2018, including top investments in cloud services ...
How Is Machine Learning Used in Bitdefender Technologies?
The terms “artificial intelligence” and “machine learning” are often used interchangeably, ...