Bitdefender Channel's blog

‘Is this data mine?’ How to answer this honest question in data breach verification

Established companies like LinkedIn, Tumblr and MySpace are being run through the mill because of old security breaches that recently surfaced on the web. From a victim’s perspective, mitigation starts with a password reset, but what’s happening on the corporate side? How should companies react in full breach era to clean up the mess and regain clients’ credibility?

Hypervisor Introspection: Fighting APTs in Business Environment – Part 1

Recent cybersecurity incidents have left organizations and companies struggling to implement the necessary resources to minimize IT risks, regardless of how much security budgets have increased. More than 71 percent of organizations fear zero-day attacks and strongly believe they’re the most serious threats, and over 74 percent believe that it’s likely and very likely that their organization will be hit by an APT (Advanced Persistent Threat).

Free comes with a price: adware can take over your device

Who doesn’t like free stuff? Getting software that you don’t have to pay for is great. Unless you do have to pay. In fact, some so-called free software can cost businesses and individuals not only cash, but also precious time and energy that users need to spend trying to remove such programs from their computers.

The Cloud Dilemma - Is Your Cloud Provider Secure?

In 2010, cloud adoption among US small medium businesses (SMBs) was just 5 percent—today, 37 percent are on the cloud, and the percentage will double by 2020, according to Forbes. In the EU, 12% of small and medium-sized enterprises (SMEs) used public cloud computing in 2014, a survey by the European Commission’s Eurostat statistics service says.

Six Tendencies Taking Shape in Enterprise Security this Year

Two years ago, the world rushed to say the antivirus industry is dead. I disagree simply because antivirus companies do not exist anymore. I haven’t seen a security company that limits its portfolio to one, traditional security (antivirus) solution. Those who’ve tried are dead and gone, but most of them have morphed into cybersecurity companies.

The Showdown between Convenience and Security

Every organization has faced the dilemma of convenience over security and most have compromised on either one or the other. While the information security triad of integrity, confidentiality and availability has been regarded as the mantra of CSOs, convenience has constantly played an important role in both productivity and operations.

Pages