You Were The Chosen One, XDR

Cybersecurity solutions have an intermittent success rate, albeit, not as predictable as how ...

How MDR Services Can Help Vulnerable Healthcare Organizations

Healthcare organizations have not had the best couple of years when it comes to ...

Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference

Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...

Learn How to Improve Your Organization’s Cyber Resilience at Infosecurity Europe

As threat landscapes shift and organizations’ attack surfaces change, it’s important to know ...

How XDR Solutions Can Help You Achieve Zero Trust

As cyber risk continues to increase, organizations need to resort to new frameworks, ...

Bitdefender Threat Debrief | June 2022

Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability “Follina” Bitdefender has been ...

Homograph Phishing Attacks - When User Awareness Is Not Enough

Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...

GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads

As enterprises shift towards a cloud-first digital environment, the need to address an ...

How XDR Can Help With IoT Device Security

With the advent of digital transformation and the pandemic-driven push to remote work, ...

How to Choose a Threat Intelligence Provider

Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...

The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats

Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...

Bitdefender Threat Debrief | May 2022

MDR Insights The MDR intelligence cell recognizes the threat that comes with homograph ...

Join Bitdefender at the 2022 RSA Conference

The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...

Looking for XDR in your MDR Partner | How XDR can improve MDR

Over the last two years, it’s clear that organizations, especially enterprises, need to ...

We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022

It is the beginning of a new year, and the internet is full of articles reviewing the ...

Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More

The enterprise cybersecurity landscape has changed dramatically in recent years. The ...

Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar

Security leaders are constantly looking to further mature their security organization and ...

Bitdefender Threat Debrief | April 2022

Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...

Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine

At the beginning of the invasion of Ukraine, we released a security advisory with ...

SDN Security—What is it and Why Should SMBs Care?

Small and mid-sized businesses (SBMs) have every reason to be interested in deploying ...

EDR & XDR – Security Solutions for Hybrid & Remote SMB Ecosystems

Organizations, including small and midsized businesses (SMBs), should be on the lookout for ...

Bitdefender Launches GravityZone Extended Detection and Response (XDR) to Improve Cyber Resilience

Bitdefender has a robust 20-year history innovating on behalf of our customers for superior ...

Best Practices in Patch Management for Cloud Workload Security

Over the past decade, organizations of all sizes have been increasingly migrating their ...

Why you might consider working with an MSP to obtain cyber insurance

Cyber insurance is quickly becoming one of the most essential cybersecurity services ...

Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response

Every endpoint in an organization – from employee computers and mobile devices, to servers, ...

Native XDR vs Open XDR

As organizations continue to grow and invest in multiple third-parties, increase their ...

Expert Insights from HIMSS 2022

The Health Information and Management Systems Society (HIMSS) conference was held earlier ...

MITRE ATT&CK® Evaluations 2022 – Why Actionable Detections Matter

On March 31st, the results of the latest round of the MITRE ATT&CK® Evaluations for ...

CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities

Zero-day vulnerabilities are among the most worrisome cyber security risks for ...

The Clock is Ticking: What to do immediately after a ransomware attack

Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...

Bitdefender Threat Debrief | March 2022

Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...

MDR—What is it and Why Should SMBs Care?

When dealing with the latest and most serious threats, cyber security leaders and teams need ...

Why Cloud Workload Security (CWS) Should Be Your 2022 Priority

The cloud is quickly becoming the most important battleground for organizations. ...

MSP Blueprint for Efficient Detection and Response

The complex security solution landscape makes it difficult for organizations to design the ...

How XDR can help protect against sophisticated threat actors

It’s not easy being a business these days. Organizations are under siege against automated ...

What is DRaaS and How Can it Benefit Smaller Companies?

One thing that’s certain about business is that nothing is certain. Unforeseen events can ...

A guide to cyber insurance for 2022

The cyber insurance market is hardening and becoming more mature as years pass and the ...

Celebrating Women in Cybersecurity

A Conversation with Bitdefender’s VP of Product Marketing, Amy Blackshaw, for International ...

Bitdefender Advanced Threat Intelligence Now Available Through the ThreatBlockr Platform

From technical specialists to team leaders and business architects, security experts today ...

SMBs Need to Go on the Offensive with Cyber Security

Recently there has been a push for more proactive cyber security strategies, even to the ...

Bitdefender Wins Three AV-TEST Awards

Bitdefender has earned three prestigious Best Protection awards from AV-TEST, an independent ...

Security Advisory: A risk-based approach for improving your cybersecurity posture due to the invasion of Ukraine

We want to provide organizations with recommendations to prepare for potential cyberattacks ...

Bitdefender Threat Debrief | February 2022

Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...

What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)

It would be almost impossible to use a computer or network for business and be unaware of ...

Small Business Data Security in the Event of a Big Tech Breakup

A lot of time and energy has been spent debating the future of Big Tech, and what could ─ ...

What Are The Biggest Cyber Threats of The Future?

Cybersecurity was a growing concern even before the Internet became the dominant form of ...

Why organizations need to prepare themselves for BEC attacks

Organizations face a number of different attacks across a variety of vectors, which is often ...

Key Security Considerations for CISOs in 2022

As CISOs (chief information security officers) and other cyber security leaders prepare for ...

The Threat Intelligence Requirement

The war against hackers and cybercriminals continues to intensify daily. As hackers become ...

Security Blueprint: How to Get Your Marketing & Goal Setting Right

A solid security blueprint helps you to provide the cybersecurity and threat protection ...

Bitdefender Threat Debrief | January 2022

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Spam Alert: EU Business Register Scams Are Back to Threaten Your Organization’s Wallet

Fraudsters behind the decade-old EU Business Register scam are wreaking havoc once again, ...

2022 Cybersecurity Predictions: Bitdefender Expert Picks

2021 wasn’t the best year for cybersecurity — if you pitted companies versus malicious ...

How to Find the Right MDR that Works With Your Organization

Managed Detection and Response or MDR, is on the cusp of becoming a mainstream cybersecurity ...

Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...

Bitdefender Achieves Highest Score in AV-Comparatives Security Report

We’re excited to announce that Bitdefender has been designated as a Strategic Leader in ...

Applying Operational Excellence in MDR

This is the final installment in our three-part blog series on how Bitdefender has built ...

Top 2022 Cybersecurity Predictions for the Healthcare Industry

The healthcare industry has been one of the most targeted industries over the past few years ...

Applying Operational Excellence in MDR

This is the second in a three-part blog series from Bitdefender on how we have built ...

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...

Security Blueprint: Understanding the Sales Process & Technical Requirements

A solid security blueprint helps you provide customers with the knowledge and solutions they ...

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Bitdefender Threat Debrief | December 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on ...

Supply Chain Security Threats - What SMBs Need to Know

Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...

The AV Comparatives Leaderboard Is Not As Crowded As It Seems

Three things matter the most when defending an organization against cyber threats: ...

What is Cyber Insurance? (and how do I know if i need it?)

Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...

Log4Shell – The call is coming from inside the house

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

What is SASE?

Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...

Tactical Threat Intelligence: How to shield data from advanced attacks

Struck by the reality of remote collaboration, companies had to rethink both their business ...

Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

The Top Cloud Threats that SMBs Need to Address

Small and mid-sized businesses (SMBs), like global enterprises, are relying more and more on ...

Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

Tactical Threat Intelligence: What is it and practical use cases

As digital technologies continue to become central to every industry, they foster greater ...

Retail Cybersecurity: Common Threats During the Holiday Shopping Season

With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...

What's Included in a Security Blueprint?

Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses ...

Bitdefender Threat Debrief | November 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Why Third-Party Testing is Critical for Informed Customer Decisions

With 400+ new threats discovered each minute and 30 billion threat queries validated daily; ...

Cloud-Native Security—What is it and Why it Matters

The term “cloud native” is turning up more and more in vendor promotions and news content, ...

The 7 Biggest Digital Threats of Black Friday and Cyber Monday

Cyber crime is causing more chaos than ever, and looms large for small business owners as ...

Bitdefender’s 20th Anniversary: A look at the past, present, and future through its people

We’re incredibly excited to celebrate Bitdefender’s 20th anniversary and thought we would ...

Small Online Retailers Face These Big Online Threats This Holiday Season

The holidays are the time that makes or breaks a large number of small online retailers, and ...

Cybersecurity in Banking: Bank hackers, ransomware, and more

The banking industry has famously been the target of many malicious hackers, leading to ...

How to Protect Distance Learning Against Cyber Threats

Terms such as distance learning, distance education, remote learning, cyber education, and ...

What is RaaS and why is it so dangerous?

It’s no secret that ransomware is quickly becoming the most dangerous threat to ...

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally ...

The Future of the Container Security for SMBs

As more and more small and mid-sized businesses (SMBs) shift data and workloads to the ...

Nov 04, 2021

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 2021 marks a special month for Bitdefender as we celebrate our 20th anniversary. It ...

Healthcare threat hunting must get proactive

There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...

Why cybersecurity departments need a vendor management policy

Organizations have more third-parties and vendors than ever before, so much so that it’s ...

Bitdefender Threat Debrief | October 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator

The threat landscape is changing. Crimeware, a class of malware designed specifically to ...

What is EDR and why is endpoint security so important?

Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...

Enhancing Cyber Resilience through Extended Detection and Response (XDR)

Summary Advanced attacks represent a challenge for organizations that are getting breached ...

Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator

The threat of ransomware has grown dramatically in recent years. The recent emergence of ...

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen ...

How Quantum Computing Will Impact Cybersecurity

The field of quantum computing is still in its early stages, but the technology will be ...

Pitfalls To Avoid With Your Security Awareness Training (SAT) Program

If you’re tasked with securing your organization, your employees are usually one of the ...

Top SMB Security Tips for Cybersecurity Awareness Month

October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...

Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter

These days, the line between our online and offline lives has become indistinguishable. Our ...

Why healthcare IoT requires stronger healthcare cybersecurity

The healthcare industry has gone through a dramatic technological transformation, one that ...

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift ...

Bitdefender Threat Debrief | September 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware news, trends, ...

Why Healthcare Cybersecurity is Needed to Address Rising Modern Threats

The healthcare industry has undergone a major transformation -  spurred and fast-tracked by ...

Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test

Bitdefender has once again earned the top ranking for email phishing, malware and spam ...

Small and Mid-Sized Businesses Need to be Prepared for Ransomware Attacks

Ransomware attacks are currently one of the fastest-growing cyber security threats affecting ...

Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution

Quick overview Microsoft recently issued a warning for CVE-2021-40444, a zero-day remote ...

Security Issues and Risks of Cloud Computing for SMBs

For small and mid-sized businesses (SMBs), cloud computing services provide an easy and ...

Bitdefender Threat Debrief | August 2021

The Bitdefender Threat Debrief (BDTD) is a new monthly series analyzing ransomware news, ...

Narrowing the Cyber Security Skills Gap

The shortage of skills is one of the biggest current challenges facing the cyber security ...

Bitdefender Takeaways from Black Hat 2021

Black Hat has grown to be one of the cybersecurity industry’s most well attended and ...

Using the MITRE ATT&CK™ Framework to Test Your Systems

In recent years, no framework has become more prevalent than MITRE ATT&CK™, the acronym ...

Expanding security support for Azure VMware Solution

Azure VMware Solution (AVS) is designed, built, and supported by Microsoft and provides ...

New U.S. Government Website Provides Ransomware Resources for Organizations

The potential dangers of ransomware are top of mind for cyber security and IT leaders around ...

Why is Content Moderation for Email Security Solutions So Important?

As organizations expand their operations to multiple platforms, they must also manage the ...

Enhancing APT detection capabilities through Threat Intelligence

Advanced Persistent Threats (APTs) continue to produce challenges for security teams. The ...

The Growing Importance of Cloud Workload Security

A growing number of organizations are increasing their use of the cloud. These workloads, ...

Join Bitdefender at Black Hat 2021!

Come August, the Bitdefender team – along with some 20K security and InfoSec professionals – ...

Seven Steps Healthcare Providers Can Take Now to Shrink Their Security Skills Gap

Healthcare providers are operating in a time of extraordinary pressure. Whether it's ...

Jul 09, 2021

Want to get started with XDR? XEDR may be the best place to begin

Every three to five years a new cybersecurity technology term gets hyped. In 2021 it’s ...

Jul 05, 2021

Security Architecture considerations for Cyber Resilience - Threat Prevention

In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, ...

Advisory on Kaseya VSA Ransomware Attack

Update: July 13, 2021 -- Kaseya issued a critical security update for VSA users that is ...

Jul 01, 2021

How to stay ahead of Ransomware

Ransomware remains a favorite among cybercriminals, who use it to block victims’ access to ...

Jun 29, 2021

When they ATT&CK, we will D3FEND | Business Insights Bitdefender

On June 22nd, MITRE released a new framework called D3FEND to complement the ...

Ransomware Remains a Major Threat—Here’s How Organizations Can Defend Themselves

Ransomware attacks are on the rise and costing companies millions of dollars, and ...

Jun 11, 2021

Who’s Responsible for Cybersecurity when You Work from Home?

The ability to work from home seems to have seeped into people's consciousness like it's ...

Jun 03, 2021

Assessing Your Security Gaps: On which side of the security tipping point do you fall? 

IT security teams face the challenge of a complex, evolving threat landscape  Threats are ...

May 27, 2021

Detecting and Stopping Malware Threats Within Your Content Delivery Networks

CDN providers and SaaS companies with content-sharing components (such as DropBox, ...

May 25, 2021

Bitdefender’s Position on Ransomware Attacks and Decryptors

This week Bitdefender was named in a press article regarding our decision to release a free ...

May 25, 2021

A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

In the third and last part of the blog series on Practical Cyber Resilience, I will cover ...

May 21, 2021

Honoring Our 2021 CRN Women of the Channel

We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather ...

May 20, 2021

Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals

On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on ...

May 19, 2021

Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events

As new threats hit enterprise systems and light up enterprise security dashboards, security ...

May 18, 2021

Digital Transformation Shouldn’t Require a Security Transformation

It’s often asked, why can’t security innovate more?

May 17, 2021

It's Time Security Teams Begin Prep for Quantum Computing

It seems that every week new news breaks regarding the progress toward reaching practical ...

May 13, 2021

Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations

Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...

May 12, 2021

Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption

Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a ...

May 07, 2021

How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost

Security operations are expensive! Hiring, training, and keeping a team of security analysts ...

May 05, 2021

Defending against Email Threats that Don’t Involve Malware

The threat landscape continues to evolve in terms of complexity Email is still the weakest ...

May 05, 2021

The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant

Ensuring data privacy is now a worldwide concern, with many countries adopting data ...

Apr 26, 2021

The Curse of Telnet, an IoT Problem that Doesn't Want to Go Away

An unsecure communication protocol proves to be a headache in today's world Despite its age ...

Apr 23, 2021

Decoding the MITRE Engenuity ATT&CK® EVALUATIONS 2021 Results

On April 20th, the results of the latest round of the annual MITRE ATT&CK® Evaluation of ...

Apr 21, 2021

Content is Key, but Is Also a Door for Spreading Malware

Since the onset of the current health crisis, many systems have found themselves strained. ...

Apr 20, 2021

Considering Endpoint Detection and Response? What’s the best EDR choice for your business?

“We are our choices”  (John Paul Sartre) 

Apr 19, 2021

Considering McAfee Alternatives? Make Replacement an Upgrade

“When in doubt, choose change.”  (Lily Leung)   McAfee has agreed to sell its enterprise ...

Apr 15, 2021

Bitdefender Launches Major Enhancements to its Global Partner Program

The global cybersecurity landscape has changed dramatically over the past year due to the ...

Apr 12, 2021

DHS Official: Cybersecurity a "top priority" for Biden Administration

S. Secretary of Homeland Security details Federal Cybersecurity Strategy. Initial focus on ...

Apr 07, 2021

New Bitdefender Report Highlights Unique Security Challenges of 2020

Ransomware, banking malware, unwanted applications, and Android attacks all rose ...

Apr 02, 2021

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Executive order under consideration would expand what companies have to disclose security ...

Anti-Exploit Technology is Fundamental for Cloud Workload Security

All attacks include malicious activity, but not all attacks include writing malware to disk  ...

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain ...

Mar 29, 2021

EDR or MDR: Two Paths to Successful Security Defense

EDR and MDR represent two viable paths to achieving successful security defense Internal ...

Mar 25, 2021

Advanced Encryption will be Key to Future Cyber Security Efforts

Efforts have long been underway to create more advanced cryptography, and the market appears ...

Mar 25, 2021

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I ...

Mar 24, 2021

Businesses! Beware The Vengeful IT Contractor!

Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts Always revoke the ...

Mar 23, 2021

Malware Delivered Via Cloud Services Rises

53% of Web traffic is now cloud-related, a 20% year over year increase. 61% of all malware ...

Mar 22, 2021

Big Enterprise IoT Device Security Considerations

Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 ...

Mar 22, 2021

Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]

Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to ...

Mar 19, 2021

What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess

Mistaken assumptions about smart home cybersecurity lead to more problems We put much trust ...

Mar 11, 2021

Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations

We understand the public announcement of several critical zero-day vulnerabilities in ...

Mar 11, 2021

Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm

Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the ...

Mar 11, 2021

Is Security at a Tipping Point? Should You Still Go It Alone?

Have we reached a tipping point where providing for your own cyber-defense no longer makes ...

Mar 11, 2021

Wearable Devices are on the Rise, Presenting New Security Risks

More people are using wearable devices such as smartwatches, in part because of the ...

Mar 10, 2021

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

In a previous blog, I looked at the key differences between cybersecurity and ...

Mar 08, 2021

A Focused Approach to the Common Interview Process

Filling positions in the information technology career field, particularly in cybersecurity, ...

Mar 04, 2021

Remote Work and the Long-Term Impact on Risk

83% of employers now say the shift to remote work has been successful for their company, ...

Mar 03, 2021

Technology Providers: Would You Rather be Blockbuster or Netflix?

Be the voice of authority by tracking market trends for your audience Connect content with ...

Mar 02, 2021

Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities

Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems ...

Feb 25, 2021

Considering Endpoint Detection and Response? Level up your defenses with Bitdefender EDR

“The most damaging phrase in the language is 'We've always done it this way'.”  Rear Admiral ...

Feb 22, 2021

Are you ready for the post-spam era?

Augment your email security solution for today’s challenges.

Feb 22, 2021

Bolstering Industrial Cyber Security in the Age of IoT

Security for industrial infrastructures is likely to get more attention with the continuing ...

Feb 18, 2021

Misconfigurations: An Open Door to Compromise and Data Breaches

Endpoint misconfiguration accounts for 27 percent of entry points exploited by attackers ...

Feb 15, 2021

Toward the post COVID-19 Security Posture

As enterprises get comfortable with remote work, their priorities are going to shift. ...

Feb 12, 2021

Cloud Security Alliance Provides Enhanced IoT Security Guidance

As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to ...

Feb 10, 2021

Bitdefender Leaders Honored as CRN Channel Chiefs

Bitdefender this week was pleased to announce that CRN, a top channel publication, named ...

Feb 09, 2021

Pajama-Clad Security: The Cyber Risks of Working from Home

A year ago, we would step into the office each morning, swipe our badge at reception, pass ...

Feb 04, 2021

Concerns about Security are Being Fueled by Shifting Business Priorities, Pandemic-Induced Remote Work, and Accelerated Deployment of New Technologies

Organizations’ concerns about cyber security, privacy, cloud, and technology resilience are ...

Jan 29, 2021

BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users

Fraudsters found a way during the recent holiday season to take advantage of users' "Out of ...

Looking for an alternative to Symantec Endpoint Protection?

“There are far better things ahead than any we leave behind.”  C.S. Lewis

Jan 25, 2021

Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats

Financial services firms are major targets of cyber attacks A recent report describes six ...

Jan 25, 2021

The 2020 Year in Cybersecurity Review

When it came to healthcare security, 2020 proved to be a continuation of the state of ...

Jan 22, 2021

If the US President Can’t Secure His IoT Devices, Can You?

People’s homes are full of cameras and microphones, which in theory allow attackers to do ...

Jan 20, 2021

Q&A: Discussing Bitdefender Business Solutions Group’s Growing Momentum

Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part ...

Jan 15, 2021

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

IoT manufacturers often favor speed of rollout over security Attackers don’t have to work ...

Jan 14, 2021

Pandemic’s Impact on Cyber Security is Far Reaching

An overwhelming majority of business and technology executives worldwide plan to shift their ...

Jan 06, 2021

Three Security Headaches in 2021 and the Technologies to Fix Them

Remote workers have become lucrative ground for lurking cybercriminals Scams purporting to ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW