Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution
The increase in cloud adoption has significantly impacted the way organizations think about ...
Bitdefender Provides Cross-Platform Visibility and Security to Windows Defender ATP users
Targetted attacks and advanced persistent threats have become the new normal in enterprises ...
Machine Learning – A Tool for Augmenting Security
The use of machine learning algorithms in the security industry has become a necessity with ...
How do I tell my CFO what security technologies to buy?
Chief Financial Officers (CFOs) these days have a hard time balancing budgets and ...
Ransomware attacks increase 300% in 2016
In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 ...
Public Cloud Services Market to Grow 18% to $246.8 Billion in 2017, Gartner says
The global public cloud services market is expected to grow by 18 percent in 2017 comparted ...
Supply Chain Security Vital to Organizations
Despite obvious supply chain differences between organizations in different industries, IT ...
Outnumbered, yet Strong: Artificial Intelligence as a Force Multiplier in Cyber-Security
When talking about artificial intelligence, people typically envision a Sci-Fi world where ...
How security teams commonly sabotage their own efforts
It seems there’s no shortage of enterprises that fall short when it comes to protecting ...
The Internet of Things: Big Opportunity, Huge Security Challenge
One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly ...
Struggling to Control a Burgeoning Number of Endpoints? Consider a Centralized Management Strategy
The definition of corporate “endpoints” is constantly evolving, and securing those endpoints ...
Cyberattacks, Cybersecurity, and Where’s It All Heading
Cybersecurity has become a major topic of discussion for businesses and organizations of all ...