Future Linux Ransomware Ransacking the Internet
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...
Air-Gapped Systems Vulnerable to Unconventional Hackers
Today’s interconnected world leaves everyone vulnerable to threats that can use the internet ...
Sluggish Technology Spending? Not So for Information Security
A number of factors are creating a greater sense of urgency for IT security efforts at many ...
Five keys to hire and cultivate the right cybersecurity talent
The lack of cybersecurity talent relative to enterprise demand for it is strangling many ...
The Dos and Don'ts of IT Security
The don'ts - Where companies are so far wrong: A major shortcoming of companies of all sizes ...
Auto Makers’ Strategy of Turning Cars into Four-wheel Smartphones will Bring Enterprise Security into Focus
About 80% of the new generations of automobiles will be connected to the internet by 2017, ...
The need for IT legislation at an International Level
The internet is without boundaries, borders, and rules, making it a perfect freedom of ...
it-sa 2015: Virtualize all you want, but protect yourself intelligently against malware
At the IT Security Expo and Congress in Nürnberg last week, Bitdefender’s Cristian Avram ...
Businesses Warned of Router, Riddled with Security Holes and a Zero-day Exploit
When you buy a new piece of computer hardware, and connect it to your network, I really hope ...
Seven Security Misconceptions that Catch Companies Off Guard
Each time we hear about a new security incident at a major company, we assume the breach ...
Security impacts productivity: employees feel IT security is their worst enemy. How to change it?
A corporate security plan is meant to create policies that protect corporate assets and ...
Getting More Mature About Info Security
How mature is your organization’s cyber security program? It’s a relevant question, ...