U.S. Signals Sanctions for Cyber Attacks, but Questions Remain
Recently the U.S. government added a tool to the toolset it can use against those who attack ...
MRIs Prove Security Warnings Push Our Brains' Pause Buttons
Perhaps the poor users have been maligned for all these years after all. Security pundits ...
Enterprises Hold High Authentication Hopes for Software-Defined Perimeters
As we head into RSA next month, chances are high that software defined perimeter (SDP) will ...
Ho Hum… Another Data Breach
For casual observers and security experts alike, the past year or so has seen big-time data ...
A Thank You to Our Readers
Today marks the 1 Year Anniversary of this Bitdefender blog.
The Internet of Things is going to require a maniacal focus on availability and security
The Internet of Things is quickly moving from hyped concept to reality – and it’s proving to ...
An Overview of Virtualization Security Guidance: Part II
In the first post of this two-part series, I described security guidance regimes and tools ...
Cloud is Driving Shadow IT Amongst End-users and Datacenter Users
Not long ago, I presented a webinar on BrightTalk about cloud and BYOD (Bring Your Own ...
Could Industry Follow DoD Cloud Security Lead?
Even the U.S. Department of Defense admits that cloud security worries shouldn't come in the ...
Anthem breached by remote attack, 80 million records at risk
Anthem, one of the largest health insurers in The United States, has announced they have ...
An Overview of Virtualization Security Guidance: Part I
As virtualization adoption grows, organizations are becoming more attuned to the need to ...
3 Security Messages CEOs Want To Hear In 2015
As frustrating as it can be for IT leaders and CISOs to struggle with a lack of respect from ...


