Bits and Bytes: Unpacking XDR With a Forrester Guest Analyst

Bits and Bytes is a webinar series on the latest security concepts. In this latest ...

What Is Dynamic Malware Analysis?

Malware is an ongoing threat that is easy for sophisticated threat actors to execute. ...

How the EPP, EDR, and MDR Landscape Is Changing

Endpoint protection platforms (EPP) and more comprehensive versions like endpoint detection ...

3 Key Takeaways From the US National Cybersecurity Strategy

Earlier in March, the White House published a paper laying out the new cybersecurity ...

Celebrating Women in Cybersecurity | International Women’s Day 2023

International Women’s Day is observed each year around the globe as a day to celebrate ...

Targeted Threat Intelligence for Security Operations

Organizations know that they can no longer settle for the anti-virus programs, intrusion ...

What Is NIS2? (And Other Frequently Asked Questions)

GDPR to NIS2 GDPR was arguably the most impactful regulatory standard and it changed the way ...

Bitdefender Threat Debrief | February 2023

MDR Insights - Patch all the things! Ask any security professional what their advice is to ...

Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966

Starting on January 20 2023,  Bitdefender Labs started to notice a global increase in ...

PCI DSS 4.0 - How to Remain Compliant in 2023

The Payment Card Industry Data Security Standard (PCI DSS) is a wide-reaching set of ...

Technical Advisory: Immediately Patch Your VMware ESXi Servers Targeted by Opportunistic Threat Actors

Quick overview of VMware ESXi Last week, unknown threat actors started targeting, en masse, ...

Threats Mapped to the MITRE ATT&CK Framework

As cyber threats are clearly multiplying, organizations must recognize that gathering threat ...

Why All Companies Should Invest in Layered Security

Security attacks can happen to your company in many different ways. In the past, ...

ARM Support on Windows for Bitdefender Solutions

Windows on ARM (WoA) goes back a long way, it is a growing hardware and application ...

Bitdefender Recognized by Forrester Research as a Notable Provider in MDR

The managed detection and response (MDR) market is a complex one. As organizations of all ...

Bitdefender Threat Debrief | January 2023 

MDR Insights You just bought an MDR or XDR service and need to answer one simple question - ...

How to Level Up Your Cybersecurity Game in 2023

Key Takeaways:  The continuing digitization of the global economy, ever-increasing numbers ...

Learn the “Hype” Around EPP, EDR, XDR – Industry Analyst Expert Recommendations

The endpoint security market is one of the fastest growing cybersecurity sectors, and for ...

Building Resilience Through Threat Intelligence (TI)

This article provides a detailed overview of building resilience through threat ...

Technical Advisory: Proxy*Hell Exploit Chains in the Wild 

At the end of November 2022, experts from Bitdefender Labs started to notice an increase in ...

How to Close the Cybersecurity Skills Gap and Keep Up With Evolving Threats

The threat and risk landscape has changed dramatically and too rapidly for many ...

Race Against the Machine - The Countdown to Adversarial AI

Unless you’ve been living under a rock for the last few months, you’ve probably heard of ...

What the MDR Landscape Will Look Like in 2023

The managed services industry has made a huge impact and is one of the more significant ...

2023 Bitdefender Cybersecurity Predictions

2022, just like the years before, wasn’t a peaceful year for cybersecurity. 

Bitdefender Year in Review: Top Cybersecurity Highlights from 2022

2022 brought another year marked by data breaches, ransomware attacks, zero-day ...

Bitdefender Threat Debrief | December 2022 

MDR Insights EDR Vulnerabilities A recent vulnerability known as Aikidodemonstrated how some ...

Bitdefender Ranked First in the Q4 2022 VBSpam Test

The Bitdefender email security technology has been certified once again in all comparative ...

4 Healthcare Cybersecurity Predictions for 2023

Over the past few years, the healthcare industry has undergone a major transformation ...

GravityZone Excels in AV-Comparatives Business Security Test

Bitdefender Awarded Approved Business Product AV-Comparatives has given their “Approved ...

The Risks Retailers Need to Prepare for During the Holiday Shopping Period

The holiday shopping season is a busy one for retailers. Black Friday has already broken ...

Deep Dive Into a BackdoorDiplomacy Attack – A Study of an Attacker’s Toolkit

A China-linked cyber espionage operation targeting multiple telecom providers in the Middle ...

Bitdefender Threat Debrief | November 2022

MDR Insights MITRE Engenuity ATT&CK® Evaluation for managed services MITRE, an ...

How to Get Corporate Alignment of Your Cybersecurity Strategy

As a cybersecurity leader, it’s your responsibility to develop, establish, and implement a ...

Why All Companies Should Invest in Layered Security

Security attacks can happen to your company in many different ways. In the past, ...

Bitdefender Again Leads the AV-Comparatives Advanced Threat Protection Tests

In November of 2022, AV-Comparatives concluded their 2022 Advanced Threat Protection Test ...

How to Be a Cybersecurity Leader for the Whole Organization

The cybersecurity threats and risks currently facing organizations reach beyond the scope of ...

Analyzing the 2022 MITRE ATT&CK Evaluation for Managed Services

On November 9, the results of the first MITRE Engenuity ATT&CK® Evaluation for Managed ...

Nov 08, 2022

Proactive vs. Reactive Security - How Threat Intelligence Can Help

Some bad things only need to happen once. As far as cybersecurity goes, one data breach is ...

Twitter Takeover Raises New Cybersecurity Concerns

While the relevance is debatable, news of Elon Musk’s Twitter takeover has been difficult to ...

How the Retail Industry Can Boost Their Cybersecurity With XDR and MDR Services

The retail industry faces unique challenges when it comes to risk management and ...

Bitdefender Threat Debrief | October 2022

MDR Insights Cyber Security Awareness: Threat Modeling As stated by OWASP, “Threat modeling ...

Cybersecurity Awareness Month – The Importance of Threat Intelligence

As the 2022 Cybersecurity Awareness Month draws to a close, it’s important for people and ...

The History of AI Tricking Humans

In the Western world, the earliest known case of fraud was recorded in 300 BC. Since then, ...

Cybersecurity Awareness Month – Securing the Cloud

As we make our way through Cybersecurity Awareness Month, Bitdefender is continuing our blog ...

Effective Fraud Detection and Prevention with Threat Intelligence

Organizations have moved a considerable part of operations online to ease the purchase ...

The Importance of Public-Private Partnerships in the Fight Against Cybercrime

The public sector is facing a rapid rise in malicious threats. For years, the private sector ...

Cybersecurity Awareness Month – It’s About People

Every October, the National Cybersecurity Alliance (NCA) and the Cybersecurity and ...

From One Crisis to the Next: Supply Chain Issues and Climate Change

On the face of it, cybersecurity and climate change couldn’t seem more different. While both ...

Are Open-Source Threat Intelligence Solutions Still Competitive?

Nobody wants to play the losing game. But when it comes to cybersecurity, thinking on your ...

How MDR Can Help Organizations Overcome the Cybersecurity Talent Shortage

As cyber attacks grow in volume and sophistication, so too does a major shortage in the ...

Deep Dive into a Cryptojacking Operation

A new cryptojacking campaign was recently discovered by our security researchers from ...

Cybersecurity Awareness Month – Four Key Behaviors for Stronger Cyber Resilience

October is Cybersecurity Awareness Month, a collaboration between government and private ...

ESG Report: How Important is MDR to Security Teams?

With threats continuing to evolve and architectural and environmental shifts, organizations ...

How to Choose the Right Cybersecurity Solution for Your Organization

As landscapes, threats, and attack surfaces change, organizations often need to adapt and ...

Tech Explainer | What is DLL Sideloading?

Welcome to the Bitdefender tech explainer about DLL sideloading attacks! In this article, we ...

Bitdefender Threat Debrief | September 2022

MDR Insights What are hybrid attacks? In the last few years, we have seen a dramatic shift ...

Sep 28, 2022

Bitdefender's Historic Partnership with Ferrari F1 Racing Team

Bitdefender is excited to announce its multi-year partnership with Scuderia Ferrari, the ...

Unboxing Linux & Container Security - Common Misconceptions About CWS

Cloud computing is the powerhouse of today’s digital economy. Organizations across all ...

Meet Bitdefender at GITEX GLOBAL 2022

As THE undisputed tech event for more than 40 years, GITEX GLOBAL, taking place October 10 – ...

Achieving Sustainability and IoT Security in Digital Transformation

The COVID-19 pandemic had a dramatic effect on the environment. Due to the shift from daily ...

Actionable Threat Intelligence for Cybersecurity

The ever-changing world of cybersecurity has challenged businesses and organizations of all ...

The Evolution of Cybersecurity and Risk Management in the Healthcare Industry

2015 was a wake up call for the healthcare industry. It was the year of the healthcare ...

CIS Controls and the Fight Against Climate Change

Smart technologies and the Internet of Things (IoT) devices are revolutionizing the energy ...

Cyber Risk Mitigation in the Era of Quantum Computing

Quantum computing, once widely-viewed as little more than steampunk-inspired sci-fi fantasy, ...

Meet With Bitdefender at VB2022 in Prague

VB conference is an international cybersecurity event hosted by Virus Bulletin, a ...

Tactical Threat Intelligence – Everything You Need to Know

The ever-changing nature of cybersecurity has challenged businesses and organizations of all ...

Upgrading Cryptography to a Post-Quantum Secure State

Cybersecurity and privacy is a lofty task when taking into consideration the attack surface ...

Deep Dive into a Corporate Espionage Operation

Corporate espionage, also known as industrial espionage, is espionage conducted for ...

Three Reasons Why Organizations Need MDR

Resource constrained organizations have a cybersecurity problem. While digital ...

Bitdefender Threat Debrief | August 2022

In this month’s Threat Debrief, we asked experts from our Managed Detection and Response ...

How Will Machine Learning (ML) Tools Alter the Cyber Threat Landscape?

Artificial intelligence, or AI for short, is by no means a new phenomenon. The term has ...

Black Hat 2022 Recap: Device42, IoT Vulnerabilities & More

Bitdefender recently joined thousands of members of the international cybersecurity ...

Will Companies Need A Chief Artificial Intelligence Officer (CAIO)?

The adoption of artificial intelligence (AI) and machine learning (ML) technologies is ...

How Quantum Computing Will Change Encryption Forever

The interaction between companies and threats have always been cyclical. Threats and ...

XDR: The Latest TLA or Newest Cyber Shield?

The cybersecurity industry is full of three-letter acronyms (TLAs). Often, they are simply a ...

The AI Cyber Threat of Google LaMDA

Artificial intelligence (AI), a phrase that has been in use since the 1950s, is defined as ...

Why NAD Is Essential For Cloud Workload Security

The network is the new battlefront in cybersecurity. Hackers continue to increase the ...

Operational Threat Intelligence – A Crucial Tool For Cyber Resilience

Cyber Security is paramount in modern business as attacks are constantly evolving and ...

No More Ransom – Six Years of Innovating to Fight Ransomware Together

When talking about cybercrime, you can’t avoid the topic of ransomware. It is one of the few ...

Bitdefender and Amazon Web Services Strengthen Cloud Security

It’s no secret that cloud computing is growing rapidly. Over the past several years, ...

How XDR Can Transform MSP Cybersecurity

Your customers probably don’t ask how different technologies deploy heuristics to detect ...

Bitdefender Threat Debrief | July 2022

Managed Detection and Response (MDR) Insights Let's talk about credential leaks. Whether ...

Join Bitdefender at Black Hat 2022

Black Hat is an internationally recognized cybersecurity conference known for providing ...

Why SMBs Need To Consider Cyber Insurance

The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on ...

A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial

The threat landscape is constantly changing. A few months into the pandemic, as most human ...

Bitdefender Introduces Managed Detection and Response (MDR) Foundations

We are thrilled to announce the availability of Bitdefender MDR Foundations, a true Managed ...

How Cyber Resilience Enables Business Growth

We live in a time of unprecedented technological innovation. We are more digitally connected ...

You Were The Chosen One, XDR

Cybersecurity solutions have an intermittent success rate, albeit, not as predictable as how ...

How MDR Services Can Help Vulnerable Healthcare Organizations

Healthcare organizations have not had the best couple of years when it comes to ...

Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference

Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...

Learn How to Improve Your Organization’s Cyber Resilience at Infosecurity Europe

As threat landscapes shift and organizations’ attack surfaces change, it’s important to know ...

How XDR Solutions Can Help You Achieve Zero Trust

As cyber risk continues to increase, organizations need to resort to new frameworks, ...

Bitdefender Threat Debrief | June 2022

Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability “Follina” Bitdefender has been ...

Homograph Phishing Attacks - When User Awareness Is Not Enough

Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...

GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads

As enterprises shift towards a cloud-first digital environment, the need to address an ...

How XDR Can Help With IoT Device Security

With the advent of digital transformation and the pandemic-driven push to remote work, ...

How to Choose a Threat Intelligence Provider

Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...

The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats

Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...

Bitdefender Threat Debrief | May 2022

MDR Insights The MDR intelligence cell recognizes the threat that comes with homograph ...

Join Bitdefender at the 2022 RSA Conference

The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...

Looking for XDR in your MDR Partner | How XDR can improve MDR

Over the last two years, it’s clear that organizations, especially enterprises, need to ...

We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022

It is the beginning of a new year, and the internet is full of articles reviewing the ...

Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More

The enterprise cybersecurity landscape has changed dramatically in recent years. The ...

Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar

Security leaders are constantly looking to further mature their security organization and ...

Bitdefender Threat Debrief | April 2022

Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...

Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine

At the beginning of the invasion of Ukraine, we released a security advisory with ...

SDN Security—What Is It and Why Should SMBs Care?

Small and mid-sized businesses (SBMs) have every reason to be interested in deploying ...

EDR & XDR – Security Solutions for Hybrid & Remote SMB Ecosystems

Organizations, including small and midsized businesses (SMBs), should be on the lookout for ...

Bitdefender Launches GravityZone Extended Detection and Response (XDR) to Improve Cyber Resilience

Bitdefender has a robust 20-year history innovating on behalf of our customers for superior ...

Best Practices in Patch Management for Cloud Workload Security

Over the past decade, organizations of all sizes have been increasingly migrating their ...

Why You Might Consider Working With an MSP to Obtain Cyber Insurance

Cyber insurance is quickly becoming one of the most essential cybersecurity services ...

Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response

Every endpoint in an organization – from employee computers and mobile devices, to servers, ...

Native XDR vs Open XDR

As organizations continue to grow and invest in multiple third-parties, increase their ...

Expert Insights from HIMSS 2022

The Health Information and Management Systems Society (HIMSS) conference was held earlier ...

MITRE ATT&CK® Evaluations 2022 – Why Actionable Detections Matter

On March 31st, the results of the latest round of the MITRE ATT&CK® Evaluations for ...

CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities

Zero-day vulnerabilities are among the most worrisome cyber security risks for ...

Mar 28, 2022

The Clock is Ticking: What To Do Immediately After a Ransomware Attack

Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...

Bitdefender Threat Debrief | March 2022

Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...

MDR—What is it and Why Should SMBs Care?

When dealing with the latest and most serious threats, cyber security leaders and teams need ...

Why Cloud Workload Security (CWS) Should Be Your 2022 Priority

The cloud is quickly becoming the most important battleground for organizations. ...

MSP Blueprint for Efficient Detection and Response

The complex security solution landscape makes it difficult for organizations to design the ...

How XDR can help protect against sophisticated threat actors

It’s not easy being a business these days. Organizations are under siege against automated ...

What is DRaaS and How Can it Benefit Smaller Companies?

One thing that’s certain about business is that nothing is certain. Unforeseen events can ...

A Guide to Cyber Insurance for 2022

The cyber insurance market is hardening and becoming more mature as years pass and the ...

Celebrating Women in Cybersecurity

A Conversation with Bitdefender’s VP of Product Marketing, Amy Blackshaw, for International ...

Bitdefender Advanced Threat Intelligence Now Available Through the ThreatBlockr Platform

From technical specialists to team leaders and business architects, security experts today ...

SMBs Need to Go on the Offensive with Cyber Security

Recently there has been a push for more proactive cyber security strategies, even to the ...

Bitdefender Wins Three AV-TEST Awards

Bitdefender has earned three prestigious Best Protection awards from AV-TEST, an independent ...

Security Advisory: A risk-based approach for improving your cybersecurity posture due to the invasion of Ukraine

We want to provide organizations with recommendations to prepare for potential cyberattacks ...

Bitdefender Threat Debrief | February 2022

Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...

What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)

It would be almost impossible to use a computer or network for business and be unaware of ...

Small Business Data Security in the Event of a Big Tech Breakup

A lot of time and energy has been spent debating the future of Big Tech, and what could ─ ...

What Are The Biggest Cyber Threats of The Future?

Cybersecurity was a growing concern even before the Internet became the dominant form of ...

Why Organizations Need to Prepare Themselves for BEC Attacks

Organizations face a number of different attacks across a variety of vectors, which is often ...

Key Security Considerations for CISOs in 2022

As CISOs (chief information security officers) and other cyber security leaders prepare for ...

The Threat Intelligence Requirement

The war against hackers and cybercriminals continues to intensify daily. As hackers become ...

Security Blueprint: How to Get Your Marketing & Goal Setting Right

A solid security blueprint helps you to provide the cybersecurity and threat protection ...

Bitdefender Threat Debrief | January 2022

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Spam Alert: EU Business Register Scams Are Back to Threaten Your Organization’s Wallet

Fraudsters behind the decade-old EU Business Register scam are wreaking havoc once again, ...

2022 Cybersecurity Predictions: Bitdefender Expert Picks

2021 wasn’t the best year for cybersecurity — if you pitted companies versus malicious ...

How to Find the Right MDR that Works With Your Organization

Managed Detection and Response or MDR, is on the cusp of becoming a mainstream cybersecurity ...

Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...

Bitdefender Achieves Highest Score in AV-Comparatives Security Report

We’re excited to announce that Bitdefender has been designated as a Strategic Leader in ...

Applying Operational Excellence in MDR

This is the final installment in our three-part blog series on how Bitdefender has built ...

Jan 17, 2022

Top 2022 Cybersecurity Predictions for the Healthcare Industry

The healthcare industry has been one of the most targeted industries over the past few years ...

Applying Operational Excellence in MDR

This is the second in a three-part blog series from Bitdefender on how we have built ...

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...

Security Blueprint: Understanding the Sales Process & Technical Requirements

A solid security blueprint helps you provide customers with the knowledge and solutions they ...

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Bitdefender Threat Debrief | December 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on ...

Supply Chain Security Threats - What SMBs Need to Know

Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...

The AV Comparatives Leaderboard Is Not As Crowded As It Seems

Three things matter the most when defending an organization against cyber threats: ...

What is Cyber Insurance? (and how do I know if i need it?)

Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...

Log4Shell – The call is coming from inside the house

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

What is SASE?

Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...

Tactical Threat Intelligence: How to shield data from advanced attacks

Struck by the reality of remote collaboration, companies had to rethink both their business ...

Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

The Top Cloud Threats that SMBs Need to Address

Small and mid-sized businesses (SMBs), like global enterprises, are relying more and more on ...

Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

Tactical Threat Intelligence: What Is It and Practical Use Cases

As digital technologies continue to become central to every industry, they foster greater ...

Retail Cybersecurity: Common Threats During the Holiday Shopping Season

With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...

What's Included in a Security Blueprint?

Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses ...

Bitdefender Threat Debrief | November 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Why Third-Party Testing is Critical for Informed Customer Decisions

With 400+ new threats discovered each minute and 30 billion threat queries validated daily; ...

Cloud-Native Security—What is it and Why it Matters

The term “cloud native” is turning up more and more in vendor promotions and news content, ...

The 7 Biggest Digital Threats of Black Friday and Cyber Monday

Cyber crime is causing more chaos than ever, and looms large for small business owners as ...

Bitdefender’s 20th Anniversary: A look at the past, present, and future through its people

We’re incredibly excited to celebrate Bitdefender’s 20th anniversary and thought we would ...

Small Online Retailers Face These Big Online Threats This Holiday Season

The holidays are the time that makes or breaks a large number of small online retailers, and ...

Cybersecurity in Banking: Bank hackers, ransomware, and more

The banking industry has famously been the target of many malicious hackers, leading to ...

How to Protect Distance Learning Against Cyber Threats

Terms such as distance learning, distance education, remote learning, cyber education, and ...

What Is RaaS and Why Is It So Dangerous?

It’s no secret that ransomware is quickly becoming the most dangerous threat to ...

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally ...

The Future of the Container Security for SMBs

As more and more small and mid-sized businesses (SMBs) shift data and workloads to the ...

Nov 04, 2021

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 2021 marks a special month for Bitdefender as we celebrate our 20th anniversary. It ...

Healthcare Threat Hunting Must Get Proactive

There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...

Why Cybersecurity Departments Need a Vendor Management Policy

Organizations have more third-parties and vendors than ever before, so much so that it’s ...

Bitdefender Threat Debrief | October 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator

The threat landscape is changing. Crimeware, a class of malware designed specifically to ...

What Is EDR and Why Is Endpoint Security So Important?

Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...

Enhancing Cyber Resilience through Extended Detection and Response (XDR)

Summary Advanced attacks represent a challenge for organizations that are getting breached ...

Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator

The threat of ransomware has grown dramatically in recent years. The recent emergence of ...

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen ...

How Quantum Computing Will Impact Cybersecurity

The field of quantum computing is still in its early stages, but the technology will be ...

Pitfalls To Avoid With Your Security Awareness Training (SAT) Program

If you’re tasked with securing your organization, your employees are usually one of the ...

Top SMB Security Tips for Cybersecurity Awareness Month

October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...

Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter

These days, the line between our online and offline lives has become indistinguishable. Our ...

Why Healthcare IoT Requires Stronger Healthcare Cybersecurity

The healthcare industry has gone through a dramatic technological transformation, one that ...

Sep 29, 2021

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift ...

Bitdefender Threat Debrief | September 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware news, trends, ...

Sep 27, 2021

Why Healthcare Cybersecurity is Needed to Address Rising Modern Threats

The healthcare industry has undergone a major transformation -  spurred and fast-tracked by ...

Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test

Bitdefender has once again earned the top ranking for email phishing, malware and spam ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW