Companies Piling up Bitcoins for Cyber-extortionists - Is this Defeat?
It seems UK businesses are raising a white flag to online extortionists. One in three medium ...
‘Is this data mine?’ How to answer this honest question in data breach verification
Established companies like LinkedIn, Tumblr and MySpace are being run through the mill ...
Hypervisor Introspection Redefines Security for Virtualized Environments
From 1960s mainframes to today’s cloud-centric evolution, data centers have undergone ...
Are Concerns About Security and Privacy Threatening the Future of Online Commerce?
If no one trusted the Internet, what would that mean for online business—or even for ...
Cyber insurance market remains fluid
We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...
The essential value of good threat intelligence
In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...
How to detect targeted attacks by using memory introspection
Cybercriminals can spend months inside organizations, storing away information for a future ...
Building a Culture of Security
Some argue that successful information security is a matter of getting the technology right. ...
The Internet of Things: Big Opportunity, Huge Security Challenge
One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly ...
Blitzkrieg Attacks and Employees, Companies’ Top Security Concerns, Confirming Bitdefender's 2016 Predictions
Cyber attacks involving destructive malware will become a bigger problem for organizations. ...
What Organizations Should Know When Implementing IoT Projects
With more than 24 billion Internet of Things (IoT) devices estimated to hit the market by ...