Companies Piling up Bitcoins for Cyber-extortionists - Is this Defeat?

It seems UK businesses are raising a white flag to online extortionists. One in three medium ...

‘Is this data mine?’ How to answer this honest question in data breach verification

Established companies like LinkedIn, Tumblr and MySpace are being run through the mill ...

Hypervisor Introspection Redefines Security for Virtualized Environments

From 1960s mainframes to today’s cloud-centric evolution, data centers have undergone ...

Cyber insurance market remains fluid

We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...

The essential value of good threat intelligence

In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...

How to detect targeted attacks by using memory introspection

Cybercriminals can spend months inside organizations, storing away information for a future ...

Building a Culture of Security

Some argue that successful information security is a matter of getting the technology right. ...

The Internet of Things: Big Opportunity, Huge Security Challenge

One of the hottest topics in IT these days is the Internet of Things (IoT). This is partly ...

Blitzkrieg Attacks and Employees, Companies’ Top Security Concerns, Confirming Bitdefender's 2016 Predictions

Cyber attacks involving destructive malware will become a bigger problem for organizations. ...

Apr 28, 2016

What Organizations Should Know When Implementing IoT Projects

With more than 24 billion Internet of Things (IoT) devices estimated to hit the market by ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW