Detection and Response: The cybersecurity imperative
Let’s face it, when it comes to building a solid cybersecurity program, defense alone isn’t ...
Research Shows Business Executives Are Worried About Cyber Security—And With Good Reason
What worries business executives the most these days? Lots of things, but cyber security ...
How to Mitigate Human Errors for Better Data Security
If you asked any CIO to identify the one risk influencing all security incidents, the ...
Companies Don’t Know Location of Sensitive Data, How to Find Breaches
The inability to identify critical assets or data and to properly react to security breaches ...
IT Talent Creates Major Hub in the IT World in Central, Eastern Europe, Bitdefender founder says
The Central and Eastern European region has become a major IT hub, spurring the ...
Gartner on Security: You WILL Be Breached. So Make Sure Attackers Linger No Longer
At the Gartner Security and Risk Management Summit in London last week, Gartner’s Neil ...
Data Breaches and the Loss of Privacy
We’ve touched on the issue of online privacy in previous posts, but recent data breaches ...
Computer-controlled medical devices and healthcare industry under fire from cyberattacks
The healthcare industry has been reportedly under constant cyberattack, with 67 percent of ...
Small Business Owners Boost Security after Breaches Wreak Havoc
Small businesses’ concerns about cyber threats have shot up and the perceived risk will only ...
Wearables Add Yet Another Challenge for Corporate Security
Just when many corporate security and IT executives thought they were getting something of a ...
Myriad point solutions for endpoint security – are you choosing chaos on purpose?
Comprehensive security – that which spans as many endpoint types used by an organizations as ...
3 Federal Trade Commission Cases That Taught Security Lessons The Hard Way
The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert ...