Future Linux Ransomware Ransacking the Internet

The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...

Air-Gapped Systems Vulnerable to Unconventional Hackers

Today’s interconnected world leaves everyone vulnerable to threats that can use the internet ...

Nov 05, 2015

Sluggish Technology Spending? Not So for Information Security

A number of factors are creating a greater sense of urgency for IT security efforts at many ...

Nov 04, 2015

Five keys to hire and cultivate the right cybersecurity talent

The lack of cybersecurity talent relative to enterprise demand for it is strangling many ...

The Dos and Don'ts of IT Security

The don'ts - Where companies are so far wrong: A major shortcoming of companies of all sizes ...

Oct 30, 2015

Auto Makers’ Strategy of Turning Cars into Four-wheel Smartphones will Bring Enterprise Security into Focus

About 80% of the new generations of automobiles will be connected to the internet by 2017, ...

The need for IT legislation at an International Level

The internet is without boundaries, borders, and rules, making it a perfect freedom of ...

Oct 16, 2015

it-sa 2015: Virtualize all you want, but protect yourself intelligently against malware

At the IT Security Expo and Congress in Nürnberg last week, Bitdefender’s Cristian Avram ...

Oct 13, 2015

Businesses Warned of Router, Riddled with Security Holes and a Zero-day Exploit

When you buy a new piece of computer hardware, and connect it to your network, I really hope ...

Oct 12, 2015

Seven Security Misconceptions that Catch Companies Off Guard

Each time we hear about a new security incident at a major company, we assume the breach ...

Oct 07, 2015

Security impacts productivity: employees feel IT security is their worst enemy. How to change it?

A corporate security plan is meant to create policies that protect corporate assets and ...

Oct 01, 2015

Getting More Mature About Info Security

How mature is your organization’s cyber security program? It’s a relevant question, ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW