Cyber insurance market remains fluid
We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...
The essential value of good threat intelligence
In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...
How to detect targeted attacks by using memory introspection
Cybercriminals can spend months inside organizations, storing away information for a future ...
Building a Culture of Security
Some argue that successful information security is a matter of getting the technology right. ...
The Internet of Things: Big Opportunity, Huge Security Challenge
One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly ...
Blitzkrieg Attacks and Employees, Companies’ Top Security Concerns, Confirming Bitdefender's 2016 Predictions
Cyber attacks involving destructive malware will become a bigger problem for organizations. ...
What Organizations Should Know When Implementing IoT Projects
With more than 24 billion Internet of Things (IoT) devices estimated to hit the market by ...
Cybersecurity Insurance: Closing the Widening Risk Gap
It seems no matter how hard enterprises try, no matter what investments in security controls ...
Cloud and SDN Convergence Demand Shift in Network Security
Life in the SOC has grown a lot more complicated in the last few years as the major forces ...
Petya and the Cost of Ransomware Recovery for Businesses
With cybercriminals making millions – if not billions – of dollars from ransom requests, ...
Are SMBs Facing Organized Cybercrime?
SMBs growth by far surpasses enterprise growth, last year reaching a compound annual growth ...
Panama Papers Curse: How to Prevent Your Company from Becoming the Next Mossack Fonseca
The major Panama Papers breach involving millions of files that reveal a complex tax evasion ...