As the professional world moves increasingly online, Bitdefender announces the global launch of Bitdefender Digital Identity Protection, the service that lets freelancers, self-employed, consultants and even private individuals control their online reputation. Digital Identity Protection taps the award-winning security technology of Bitdefender, perfected over two decades of service in the fight against cybercrime, to let…

As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors rightly center around health and safety, but we must also acknowledge that all of us are still targets for cyberattacks. The new work-from-home world has poked countless holes in security perimeters, so…

Back in March, I heard from several CISOs about how COVID-19 was disrupting their cybersecurity programs and changing their priorities. A few weeks later, I connected with some CISO friends, and got an update on phase 2 of their pandemic journeys. While no one knows when the coronavirus impact will end, we are getting a…

EfficientIP launched Cloud IPAM Sync, a new service that enables IT managers to improve control over applications hosted in multi-cloud environments. Cloud IPAM Sync uses DDI to provide central visibility and unified management over internal and cloud datacenters, thanks to real-time repository information. The cloud has become an attractive option for both enterprises and attackers….

As millions of employees continue to work from home for the foreseeable future and in some cases perhaps indefinitely, balancing the ongoing demands of employee productivity and information security will be paramount. The historical “castle and moat” model of protecting IT infrastructure is outdated and will be further challenged by the emergence of a new…

The attack surface of large enterprises has grown in recent months driven by the new work conditions imposed by the COVID-19 pandemic. The threat has increased in many areas including servers that are directly accessible from the internet, domain names, websites, web forms, certificates, third-party applications and components or mobile apps. While some of those…

As cyber threats and remote working challenges linked to COVID-19 continue to rise, IT teams are increasingly pressured to keep organizations’ security posture intact. When it comes to remote working, one of the major issues facing enterprises is shadow IT. End users eager to adopt the newest cloud applications to support their remote work are…