Verizon Data Breach Report: Organizations Need to Do More Security Work

Organizations could be doing a lot more to prevent information security breaches. That’s one ...

Apr 22, 2015

RSA Conference 2015: DevOps Security Comes of Age

When the term DevOps was first seen on the horizon of enterprise IT in 2009, it was largely ...

Apr 15, 2015

Hey Big Spenders… Security Getting Some Needed Funding

In a recent post we covered the potential problem of workers and managers at organizations ...

Apr 14, 2015

U.S. Signals Sanctions for Cyber Attacks, but Questions Remain

Recently the U.S. government added a tool to the toolset it can use against those who attack ...

Apr 07, 2015

MRIs Prove Security Warnings Push Our Brains' Pause Buttons

Perhaps the poor users have been maligned for all these years after all. Security pundits ...

Enterprises Hold High Authentication Hopes for Software-Defined Perimeters

As we head into RSA next month, chances are high that software defined perimeter (SDP) will ...

Mar 23, 2015

Ho Hum… Another Data Breach

For casual observers and security experts alike, the past year or so has seen big-time data ...

Mar 12, 2015

A Thank You to Our Readers

Today marks the 1 Year Anniversary of this Bitdefender blog.

The Internet of Things is going to require a maniacal focus on availability and security

The Internet of Things is quickly moving from hyped concept to reality – and it’s proving to ...

An Overview of Virtualization Security Guidance: Part II

In the first post of this two-part series, I described security guidance regimes and tools ...

Cloud is Driving Shadow IT Amongst End-users and Datacenter Users

Not long ago, I presented a webinar on BrightTalk about cloud and BYOD (Bring Your Own ...

Could Industry Follow DoD Cloud Security Lead?

Even the U.S. Department of Defense admits that cloud security worries shouldn't come in the ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW