IT Security Budgets, and the Lost Opportunities of Poor Communication
Many of the cybersecurity challenges that CISOs, CIOs, and business leaders face today are ...
Forget Data Breach Statistics, 2016 Breaches Will Get Personal
Another year came and went and the breach statistics were once again smashed by a raft of ...
Public Data Breach Disclosure: The Five Keys to Making the Best Out of a Bad Situation
Enduring a major data breach is certainly bad, but it can be made worse by botching the ...
AV-TEST Ranks Bitdefender Endpoint Protection as Top Business Solution
CIOs and CISOs unanimously agree that IT departments need beefed-up security with solutions ...
Chip and PIN Finally Arrives in the U.S., but Uncertainties Remain for Payment Security
The first U.S. holiday season with chip and PIN technology in place is freshly behind us. ...
Lack of business skills forms main barrier to global expansion for tech startups, Bitdefender founder says
High-tech start-ups aiming to expand globally usually face one main, immediate barrier - the ...
Tackling Cybercrime with the Legislation Unicorn
In light of recent terrorist and cyber-terrorist attacks, European states have more ...
Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies
With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what ...
Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance
Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to ...
Future Linux Ransomware Ransacking the Internet
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...
Air-Gapped Systems Vulnerable to Unconventional Hackers
Today’s interconnected world leaves everyone vulnerable to threats that can use the internet ...
Sluggish Technology Spending? Not So for Information Security
A number of factors are creating a greater sense of urgency for IT security efforts at many ...


