You Were The Chosen One, XDR
Cybersecurity solutions have an intermittent success rate, albeit, not as predictable as how ...
How MDR Services Can Help Vulnerable Healthcare Organizations
Healthcare organizations have not had the best couple of years when it comes to ...
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...
Learn How to Improve Your Organization’s Cyber Resilience at Infosecurity Europe
As threat landscapes shift and organizations’ attack surfaces change, it’s important to know ...
How XDR Solutions Can Help You Achieve Zero Trust
As cyber risk continues to increase, organizations need to resort to new frameworks, ...
Bitdefender Threat Debrief | June 2022
Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability “Follina” Bitdefender has been ...
Homograph Phishing Attacks - When User Awareness Is Not Enough
Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...
Technical Advisory: CVE-2022-30190 Zero-day Vulnerability “Follina” in Microsoft Support Diagnostic Tool
Quick Overview On Monday, May 30, 2022, Microsoft issued CVE-2022-30190, a zero-day remote ...
GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads
As enterprises shift towards a cloud-first digital environment, the need to address an ...
How XDR Can Help With IoT Device Security
With the advent of digital transformation and the pandemic-driven push to remote work, ...
How to Choose a Threat Intelligence Provider
Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...
The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats
Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...
Bitdefender Threat Debrief | May 2022
MDR Insights The MDR intelligence cell recognizes the threat that comes with homograph ...
Join Bitdefender at the 2022 RSA Conference
The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...
Looking for XDR in your MDR Partner | How XDR can improve MDR
Over the last two years, it’s clear that organizations, especially enterprises, need to ...
We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022
It is the beginning of a new year, and the internet is full of articles reviewing the ...
Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More
The enterprise cybersecurity landscape has changed dramatically in recent years. The ...
Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar
Security leaders are constantly looking to further mature their security organization and ...
Bitdefender Threat Debrief | April 2022
Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with ...
SDN Security—What is it and Why Should SMBs Care?
Small and mid-sized businesses (SBMs) have every reason to be interested in deploying ...
EDR & XDR – Security Solutions for Hybrid & Remote SMB Ecosystems
Organizations, including small and midsized businesses (SMBs), should be on the lookout for ...
Bitdefender Launches GravityZone Extended Detection and Response (XDR) to Improve Cyber Resilience
Bitdefender has a robust 20-year history innovating on behalf of our customers for superior ...
Best Practices in Patch Management for Cloud Workload Security
Over the past decade, organizations of all sizes have been increasingly migrating their ...
Why you might consider working with an MSP to obtain cyber insurance
Cyber insurance is quickly becoming one of the most essential cybersecurity services ...
Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response
Every endpoint in an organization – from employee computers and mobile devices, to servers, ...
Native XDR vs Open XDR
As organizations continue to grow and invest in multiple third-parties, increase their ...
Expert Insights from HIMSS 2022
The Health Information and Management Systems Society (HIMSS) conference was held earlier ...
MITRE ATT&CK® Evaluations 2022 – Why Actionable Detections Matter
On March 31st, the results of the latest round of the MITRE ATT&CK® Evaluations for ...
CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities
Zero-day vulnerabilities are among the most worrisome cyber security risks for ...
The Clock is Ticking: What to do immediately after a ransomware attack
Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...
Bitdefender Threat Debrief | March 2022
Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...
MDR—What is it and Why Should SMBs Care?
When dealing with the latest and most serious threats, cyber security leaders and teams need ...
Why Cloud Workload Security (CWS) Should Be Your 2022 Priority
The cloud is quickly becoming the most important battleground for organizations. ...
MSP Blueprint for Efficient Detection and Response
The complex security solution landscape makes it difficult for organizations to design the ...
How XDR can help protect against sophisticated threat actors
It’s not easy being a business these days. Organizations are under siege against automated ...
What is DRaaS and How Can it Benefit Smaller Companies?
One thing that’s certain about business is that nothing is certain. Unforeseen events can ...
A guide to cyber insurance for 2022
The cyber insurance market is hardening and becoming more mature as years pass and the ...
Celebrating Women in Cybersecurity
A Conversation with Bitdefender’s VP of Product Marketing, Amy Blackshaw, for International ...
Bitdefender Advanced Threat Intelligence Now Available Through the ThreatBlockr Platform
From technical specialists to team leaders and business architects, security experts today ...
SMBs Need to Go on the Offensive with Cyber Security
Recently there has been a push for more proactive cyber security strategies, even to the ...
Bitdefender Wins Three AV-TEST Awards
Bitdefender has earned three prestigious Best Protection awards from AV-TEST, an independent ...
Security Advisory: A risk-based approach for improving your cybersecurity posture due to the invasion of Ukraine
We want to provide organizations with recommendations to prepare for potential cyberattacks ...
Bitdefender Threat Debrief | February 2022
Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...
What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)
It would be almost impossible to use a computer or network for business and be unaware of ...
Small Business Data Security in the Event of a Big Tech Breakup
A lot of time and energy has been spent debating the future of Big Tech, and what could ─ ...
What Are The Biggest Cyber Threats of The Future?
Cybersecurity was a growing concern even before the Internet became the dominant form of ...
Why organizations need to prepare themselves for BEC attacks
Organizations face a number of different attacks across a variety of vectors, which is often ...
Key Security Considerations for CISOs in 2022
As CISOs (chief information security officers) and other cyber security leaders prepare for ...
The Threat Intelligence Requirement
The war against hackers and cybercriminals continues to intensify daily. As hackers become ...
Security Blueprint: How to Get Your Marketing & Goal Setting Right
A solid security blueprint helps you to provide the cybersecurity and threat protection ...
Bitdefender Threat Debrief | January 2022
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Spam Alert: EU Business Register Scams Are Back to Threaten Your Organization’s Wallet
Fraudsters behind the decade-old EU Business Register scam are wreaking havoc once again, ...
2022 Cybersecurity Predictions: Bitdefender Expert Picks
2021 wasn’t the best year for cybersecurity — if you pitted companies versus malicious ...
How to Find the Right MDR that Works With Your Organization
Managed Detection and Response or MDR, is on the cusp of becoming a mainstream cybersecurity ...
Linux and Container Security: Removing module dependencies
Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...
Bitdefender Achieves Highest Score in AV-Comparatives Security Report
We’re excited to announce that Bitdefender has been designated as a Strategic Leader in ...
Applying Operational Excellence in MDR
This is the final installment in our three-part blog series on how Bitdefender has built ...
Top 2022 Cybersecurity Predictions for the Healthcare Industry
The healthcare industry has been one of the most targeted industries over the past few years ...
Applying Operational Excellence in MDR
This is the second in a three-part blog series from Bitdefender on how we have built ...
The Proactive Guide to Small Business Cybersecurity Strategy
Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...
What is an APT?
Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...
Security Blueprint: Understanding the Sales Process & Technical Requirements
A solid security blueprint helps you provide customers with the knowledge and solutions they ...
Applying Operational Excellence in MDR
Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...
Bitdefender Threat Debrief | December 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Bitdefender Issues Top 5 Cybersecurity Predictions for 2022
This year is coming to an end, and the cybersecurity community is working hard on ...
Supply Chain Security Threats - What SMBs Need to Know
Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...
The AV Comparatives Leaderboard Is Not As Crowded As It Seems
Three things matter the most when defending an organization against cyber threats: ...
What is Cyber Insurance? (and how do I know if i need it?)
Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...
Log4Shell – The call is coming from inside the house
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
What is SASE?
Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...
Tactical Threat Intelligence: How to shield data from advanced attacks
Struck by the reality of remote collaboration, companies had to rethink both their business ...
Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
The Top Cloud Threats that SMBs Need to Address
Small and mid-sized businesses (SMBs), like global enterprises, are relying more and more on ...
Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
Tactical Threat Intelligence: What is it and practical use cases
As digital technologies continue to become central to every industry, they foster greater ...
Retail Cybersecurity: Common Threats During the Holiday Shopping Season
With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...
Bitdefender Named a 2021 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms in North America
The Bitdefender team is excited to share that we have been named a ‘Customers’ Choice’ for ...
What's Included in a Security Blueprint?
Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses ...
Bitdefender Threat Debrief | November 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Why Third-Party Testing is Critical for Informed Customer Decisions
With 400+ new threats discovered each minute and 30 billion threat queries validated daily; ...
Cloud-Native Security—What is it and Why it Matters
The term “cloud native” is turning up more and more in vendor promotions and news content, ...
The 7 Biggest Digital Threats of Black Friday and Cyber Monday
Cyber crime is causing more chaos than ever, and looms large for small business owners as ...
Bitdefender’s 20th Anniversary: A look at the past, present, and future through its people
We’re incredibly excited to celebrate Bitdefender’s 20th anniversary and thought we would ...
Small Online Retailers Face These Big Online Threats This Holiday Season
The holidays are the time that makes or breaks a large number of small online retailers, and ...
Cybersecurity in Banking: Bank hackers, ransomware, and more
The banking industry has famously been the target of many malicious hackers, leading to ...
2021 Market Guide for Managed Detection and Response Services - A Gartner Report: Thoughts from Bitdefender MDR
Gartner® released its first Market Guide for Managed Detection and Response (MDR) back in ...
How to Protect Distance Learning Against Cyber Threats
Terms such as distance learning, distance education, remote learning, cyber education, and ...
What is RaaS and why is it so dangerous?
It’s no secret that ransomware is quickly becoming the most dangerous threat to ...
Healthcare Cloud Security Explained
Years before the pandemic, the healthcare industry had already been busily digitally ...
The Future of the Container Security for SMBs
As more and more small and mid-sized businesses (SMBs) shift data and workloads to the ...
Bitdefender Celebrates 20 Years of Cybersecurity Leadership
November 2021 marks a special month for Bitdefender as we celebrate our 20th anniversary. It ...
Healthcare threat hunting must get proactive
There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...
Why cybersecurity departments need a vendor management policy
Organizations have more third-parties and vendors than ever before, so much so that it’s ...
Bitdefender Threat Debrief | October 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator
The threat landscape is changing. Crimeware, a class of malware designed specifically to ...
What is EDR and why is endpoint security so important?
Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...
Enhancing Cyber Resilience through Extended Detection and Response (XDR)
Summary Advanced attacks represent a challenge for organizations that are getting breached ...
Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator
The threat of ransomware has grown dramatically in recent years. The recent emergence of ...
Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves
Building up a robust security department and having a strong security posture doesn’t happen ...
How Quantum Computing Will Impact Cybersecurity
The field of quantum computing is still in its early stages, but the technology will be ...
Pitfalls To Avoid With Your Security Awareness Training (SAT) Program
If you’re tasked with securing your organization, your employees are usually one of the ...
Top SMB Security Tips for Cybersecurity Awareness Month
October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...
Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter
These days, the line between our online and offline lives has become indistinguishable. Our ...
Why healthcare IoT requires stronger healthcare cybersecurity
The healthcare industry has gone through a dramatic technological transformation, one that ...
Top 5 Healthcare Cyber Attacks and Threats
Even before the novel coronavirus pandemic, which forced healthcare organizations to shift ...
Bitdefender Threat Debrief | September 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware news, trends, ...
Why Healthcare Cybersecurity is Needed to Address Rising Modern Threats
The healthcare industry has undergone a major transformation - spurred and fast-tracked by ...
Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test
Bitdefender has once again earned the top ranking for email phishing, malware and spam ...
Small and Mid-Sized Businesses Need to be Prepared for Ransomware Attacks
Ransomware attacks are currently one of the fastest-growing cyber security threats affecting ...
Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution
Quick overview Microsoft recently issued a warning for CVE-2021-40444, a zero-day remote ...
Security Issues and Risks of Cloud Computing for SMBs
For small and mid-sized businesses (SMBs), cloud computing services provide an easy and ...
Five Myths About Preventing Cyber Security Threats
Cyber security for small and mid-sized businesses (SMBs) is a particularly daunting ...
Beyond the XDR Hype – A Look at the Forrester New Tech on Extended Detection and Response
Driven by the need for richer threat context, the Extended Detection and Response (XDR) ...
Bitdefender Threat Debrief | August 2021
The Bitdefender Threat Debrief (BDTD) is a new monthly series analyzing ransomware news, ...
Combatting Ransomware as a Service (RaaS)
Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware ...
The Five Biggest Challenges in Healthcare Security Right Now
The healthcare industry is in the midst of tremendous change. And it comes from the pressure ...
Narrowing the Cyber Security Skills Gap
The shortage of skills is one of the biggest current challenges facing the cyber security ...
Bitdefender Takeaways from Black Hat 2021
Black Hat has grown to be one of the cybersecurity industry’s most well attended and ...
How container workloads are changing the future of cybersecurity
The use of containers to increase speed of deployment and portability for modern ...
Using the MITRE ATT&CK™ Framework to Test Your Systems
In recent years, no framework has become more prevalent than MITRE ATT&CK™, the acronym ...
Expanding security support for Azure VMware Solution
Azure VMware Solution (AVS) is designed, built, and supported by Microsoft and provides ...
2021 Gartner® Market Guide for Cloud Workload Protection Platforms | Bitdefender’s key takeaways from the report
Protection requirements for cloud workloads continue to grow as organizations accelerate ...
New U.S. Government Website Provides Ransomware Resources for Organizations
The potential dangers of ransomware are top of mind for cyber security and IT leaders around ...
Why is Content Moderation for Email Security Solutions So Important?
As organizations expand their operations to multiple platforms, they must also manage the ...
Deep dive into a FIN8 attack – A forensic investigation
During a recent investigation, our researchers encountered a new version of the BADHATCH ...
Enhancing APT detection capabilities through Threat Intelligence
Advanced Persistent Threats (APTs) continue to produce challenges for security teams. The ...
The Growing Importance of Cloud Workload Security
A growing number of organizations are increasing their use of the cloud. These workloads, ...
Technical Advisory: SeriousSAM – Windows 10 Flaw Can Be Used by Malicious Actors to Obtain Administrator Rights
Newer versions of Windows 10 (build 1809 - 2018-present) may be vulnerable to a local ...
Effective Healthcare Security Is Much More Than Compliance
When it comes to managing the security of their data and business-technology systems, many ...
Join Bitdefender at Black Hat 2021!
Come August, the Bitdefender team – along with some 20K security and InfoSec professionals – ...
Seven Steps Healthcare Providers Can Take Now to Shrink Their Security Skills Gap
Healthcare providers are operating in a time of extraordinary pressure. Whether it's ...
Want to get started with XDR? XEDR may be the best place to begin
Every three to five years a new cybersecurity technology term gets hyped. In 2021 it’s ...
Security Architecture considerations for Cyber Resilience - Threat Prevention
In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, ...
Advisory on Kaseya VSA Ransomware Attack
Update: July 13, 2021 -- Kaseya issued a critical security update for VSA users that is ...
How to stay ahead of Ransomware
Ransomware remains a favorite among cybercriminals, who use it to block victims’ access to ...
IDC security services analysts discuss the current threat landscape and why organizations are looking to managed detection and response (MDR) to boost their cyber resiliency
Implementing and managing security is not easy for any organization. We recently had the ...
When they ATT&CK, we will D3FEND | Business Insights Bitdefender
On June 22nd, MITRE released a new framework called D3FEND to complement the ...
Ransomware Remains a Major Threat—Here’s How Organizations Can Defend Themselves
Ransomware attacks are on the rise and costing companies millions of dollars, and ...
Who’s Responsible for Cybersecurity when You Work from Home?
The ability to work from home seems to have seeped into people's consciousness like it's ...
Assessing Your Security Gaps: On which side of the security tipping point do you fall?
IT security teams face the challenge of a complex, evolving threat landscape Threats are ...
Detecting and Stopping Malware Threats Within Your Content Delivery Networks
CDN providers and SaaS companies with content-sharing components (such as DropBox, ...
Bitdefender’s Position on Ransomware Attacks and Decryptors
This week Bitdefender was named in a press article regarding our decision to release a free ...
A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)
In the third and last part of the blog series on Practical Cyber Resilience, I will cover ...
Honoring Our 2021 CRN Women of the Channel
We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather ...
Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals
On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on ...
Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events
As new threats hit enterprise systems and light up enterprise security dashboards, security ...
Digital Transformation Shouldn’t Require a Security Transformation
It’s often asked, why can’t security innovate more?
It's Time Security Teams Begin Prep for Quantum Computing
It seems that every week new news breaks regarding the progress toward reaching practical ...
Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations
Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...
Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption
Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a ...
How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost
Security operations are expensive! Hiring, training, and keeping a team of security analysts ...
Defending against Email Threats that Don’t Involve Malware
The threat landscape continues to evolve in terms of complexity Email is still the weakest ...
The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant
Ensuring data privacy is now a worldwide concern, with many countries adopting data ...
The Curse of Telnet, an IoT Problem that Doesn't Want to Go Away
An unsecure communication protocol proves to be a headache in today's world Despite its age ...
Decoding the MITRE Engenuity ATT&CK® EVALUATIONS 2021 Results
On April 20th, the results of the latest round of the annual MITRE ATT&CK® Evaluation of ...
Content is Key, but Is Also a Door for Spreading Malware
Since the onset of the current health crisis, many systems have found themselves strained. ...
Considering Endpoint Detection and Response? What’s the best EDR choice for your business?
“We are our choices” (John Paul Sartre)
Considering McAfee Alternatives? Make Replacement an Upgrade
“When in doubt, choose change.” (Lily Leung) McAfee has agreed to sell its enterprise ...
Bitdefender Launches Major Enhancements to its Global Partner Program
The global cybersecurity landscape has changed dramatically over the past year due to the ...
DHS Official: Cybersecurity a "top priority" for Biden Administration
S. Secretary of Homeland Security details Federal Cybersecurity Strategy. Initial focus on ...
New Bitdefender Report Highlights Unique Security Challenges of 2020
Ransomware, banking malware, unwanted applications, and Android attacks all rose ...
New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means
Executive order under consideration would expand what companies have to disclose security ...
Anti-Exploit Technology is Fundamental for Cloud Workload Security
All attacks include malicious activity, but not all attacks include writing malware to disk ...
As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare
Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain ...
EDR or MDR: Two Paths to Successful Security Defense
EDR and MDR represent two viable paths to achieving successful security defense Internal ...
Advanced Encryption will be Key to Future Cyber Security Efforts
Efforts have long been underway to create more advanced cryptography, and the market appears ...
A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)
This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I ...
Businesses! Beware The Vengeful IT Contractor!
Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts Always revoke the ...
Malware Delivered Via Cloud Services Rises
53% of Web traffic is now cloud-related, a 20% year over year increase. 61% of all malware ...
Big Enterprise IoT Device Security Considerations
Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 ...
Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]
Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to ...
What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess
Mistaken assumptions about smart home cybersecurity lead to more problems We put much trust ...
Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations
We understand the public announcement of several critical zero-day vulnerabilities in ...
Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm
Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the ...
Is Security at a Tipping Point? Should You Still Go It Alone?
Have we reached a tipping point where providing for your own cyber-defense no longer makes ...
Wearable Devices are on the Rise, Presenting New Security Risks
More people are using wearable devices such as smartwatches, in part because of the ...
A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series
In a previous blog, I looked at the key differences between cybersecurity and ...
A Focused Approach to the Common Interview Process
Filling positions in the information technology career field, particularly in cybersecurity, ...
Remote Work and the Long-Term Impact on Risk
83% of employers now say the shift to remote work has been successful for their company, ...
Technology Providers: Would You Rather be Blockbuster or Netflix?
Be the voice of authority by tracking market trends for your audience Connect content with ...
Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities
Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems ...
Considering Endpoint Detection and Response? Level up your defenses with Bitdefender EDR
“The most damaging phrase in the language is 'We've always done it this way'.” Rear Admiral ...
Are you ready for the post-spam era?
Augment your email security solution for today’s challenges.
Bolstering Industrial Cyber Security in the Age of IoT
Security for industrial infrastructures is likely to get more attention with the continuing ...
Misconfigurations: An Open Door to Compromise and Data Breaches
Endpoint misconfiguration accounts for 27 percent of entry points exploited by attackers ...
Toward the post COVID-19 Security Posture
As enterprises get comfortable with remote work, their priorities are going to shift. ...
Cloud Security Alliance Provides Enhanced IoT Security Guidance
As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to ...
Bitdefender Leaders Honored as CRN Channel Chiefs
Bitdefender this week was pleased to announce that CRN, a top channel publication, named ...
Pajama-Clad Security: The Cyber Risks of Working from Home
A year ago, we would step into the office each morning, swipe our badge at reception, pass ...
Concerns about Security are Being Fueled by Shifting Business Priorities, Pandemic-Induced Remote Work, and Accelerated Deployment of New Technologies
Organizations’ concerns about cyber security, privacy, cloud, and technology resilience are ...
BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users
Fraudsters found a way during the recent holiday season to take advantage of users' "Out of ...
Looking for an alternative to Symantec Endpoint Protection?
“There are far better things ahead than any we leave behind.” C.S. Lewis
Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats
Financial services firms are major targets of cyber attacks A recent report describes six ...
The 2020 Year in Cybersecurity Review
When it came to healthcare security, 2020 proved to be a continuation of the state of ...
If the US President Can’t Secure His IoT Devices, Can You?
People’s homes are full of cameras and microphones, which in theory allow attackers to do ...
Q&A: Discussing Bitdefender Business Solutions Group’s Growing Momentum
Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part ...
IoT Operates with a Security Deficit, but the Situation Is Not Hopeless
IoT manufacturers often favor speed of rollout over security Attackers don’t have to work ...
Pandemic’s Impact on Cyber Security is Far Reaching
An overwhelming majority of business and technology executives worldwide plan to shift their ...
Three Security Headaches in 2021 and the Technologies to Fix Them
Remote workers have become lucrative ground for lurking cybercriminals Scams purporting to ...