How XDR Can Help With IoT Device Security

With the advent of digital transformation and the pandemic-driven push to remote work, ...

How to Choose a Threat Intelligence Provider

Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...

The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats

Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...

Bitdefender Threat Debrief | May 2022

MDR Insights The MDR intelligence cell recognizes the threat that comes with homograph ...

Join Bitdefender at the 2022 RSA Conference

The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...

Looking for XDR in your MDR Partner | How XDR can improve MDR

Over the last two years, it’s clear that organizations, especially enterprises, need to ...

We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022

It is the beginning of a new year, and the internet is full of articles reviewing the ...

Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More

The enterprise cybersecurity landscape has changed dramatically in recent years. The ...

Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar

Security leaders are constantly looking to further mature their security organization and ...

Bitdefender Threat Debrief | April 2022

Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...

Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine

At the beginning of the invasion of Ukraine, we released a security advisory with ...

SDN Security—What is it and Why Should SMBs Care?

Small and mid-sized businesses (SBMs) have every reason to be interested in deploying ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW