Bits and Bytes: Unpacking XDR With a Forrester Guest Analyst
Bits and Bytes is a webinar series on the latest security concepts. In this latest ...
What Is Dynamic Malware Analysis?
Malware is an ongoing threat that is easy for sophisticated threat actors to execute. ...
How the EPP, EDR, and MDR Landscape Is Changing
Endpoint protection platforms (EPP) and more comprehensive versions like endpoint detection ...
3 Key Takeaways From the US National Cybersecurity Strategy
Earlier in March, the White House published a paper laying out the new cybersecurity ...
Celebrating Women in Cybersecurity | International Women’s Day 2023
International Women’s Day is observed each year around the globe as a day to celebrate ...
Targeted Threat Intelligence for Security Operations
Organizations know that they can no longer settle for the anti-virus programs, intrusion ...
What Is NIS2? (And Other Frequently Asked Questions)
GDPR to NIS2 GDPR was arguably the most impactful regulatory standard and it changed the way ...
Bitdefender Threat Debrief | February 2023
MDR Insights - Patch all the things! Ask any security professional what their advice is to ...
Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966
Starting on January 20 2023, Bitdefender Labs started to notice a global increase in ...
PCI DSS 4.0 - How to Remain Compliant in 2023
The Payment Card Industry Data Security Standard (PCI DSS) is a wide-reaching set of ...
Technical Advisory: Immediately Patch Your VMware ESXi Servers Targeted by Opportunistic Threat Actors
Quick overview of VMware ESXi Last week, unknown threat actors started targeting, en masse, ...
Threats Mapped to the MITRE ATT&CK Framework
As cyber threats are clearly multiplying, organizations must recognize that gathering threat ...
Why All Companies Should Invest in Layered Security
Security attacks can happen to your company in many different ways. In the past, ...
ARM Support on Windows for Bitdefender Solutions
Windows on ARM (WoA) goes back a long way, it is a growing hardware and application ...
Bitdefender Recognized by Forrester Research as a Notable Provider in MDR
The managed detection and response (MDR) market is a complex one. As organizations of all ...
Bitdefender Threat Debrief | January 2023
MDR Insights You just bought an MDR or XDR service and need to answer one simple question - ...
How to Level Up Your Cybersecurity Game in 2023
Key Takeaways: The continuing digitization of the global economy, ever-increasing numbers ...
Learn the “Hype” Around EPP, EDR, XDR – Industry Analyst Expert Recommendations
The endpoint security market is one of the fastest growing cybersecurity sectors, and for ...
Building Resilience Through Threat Intelligence (TI)
This article provides a detailed overview of building resilience through threat ...
Technical Advisory: Proxy*Hell Exploit Chains in the Wild
At the end of November 2022, experts from Bitdefender Labs started to notice an increase in ...
How to Close the Cybersecurity Skills Gap and Keep Up With Evolving Threats
The threat and risk landscape has changed dramatically and too rapidly for many ...
Race Against the Machine - The Countdown to Adversarial AI
Unless you’ve been living under a rock for the last few months, you’ve probably heard of ...
What the MDR Landscape Will Look Like in 2023
The managed services industry has made a huge impact and is one of the more significant ...
2023 Bitdefender Cybersecurity Predictions
2022, just like the years before, wasn’t a peaceful year for cybersecurity.
Bitdefender Year in Review: Top Cybersecurity Highlights from 2022
2022 brought another year marked by data breaches, ransomware attacks, zero-day ...
Bitdefender Threat Debrief | December 2022
MDR Insights EDR Vulnerabilities A recent vulnerability known as Aikidodemonstrated how some ...
Bitdefender Ranked First in the Q4 2022 VBSpam Test
The Bitdefender email security technology has been certified once again in all comparative ...
4 Healthcare Cybersecurity Predictions for 2023
Over the past few years, the healthcare industry has undergone a major transformation ...
GravityZone Excels in AV-Comparatives Business Security Test
Bitdefender Awarded Approved Business Product AV-Comparatives has given their “Approved ...
The Risks Retailers Need to Prepare for During the Holiday Shopping Period
The holiday shopping season is a busy one for retailers. Black Friday has already broken ...
Deep Dive Into a BackdoorDiplomacy Attack – A Study of an Attacker’s Toolkit
A China-linked cyber espionage operation targeting multiple telecom providers in the Middle ...
Bitdefender Threat Debrief | November 2022
MDR Insights MITRE Engenuity ATT&CK® Evaluation for managed services MITRE, an ...
How to Get Corporate Alignment of Your Cybersecurity Strategy
As a cybersecurity leader, it’s your responsibility to develop, establish, and implement a ...
Why All Companies Should Invest in Layered Security
Security attacks can happen to your company in many different ways. In the past, ...
Bitdefender Again Leads the AV-Comparatives Advanced Threat Protection Tests
In November of 2022, AV-Comparatives concluded their 2022 Advanced Threat Protection Test ...
How to Be a Cybersecurity Leader for the Whole Organization
The cybersecurity threats and risks currently facing organizations reach beyond the scope of ...
Analyzing the 2022 MITRE ATT&CK Evaluation for Managed Services
On November 9, the results of the first MITRE Engenuity ATT&CK® Evaluation for Managed ...
Proactive vs. Reactive Security - How Threat Intelligence Can Help
Some bad things only need to happen once. As far as cybersecurity goes, one data breach is ...
Twitter Takeover Raises New Cybersecurity Concerns
While the relevance is debatable, news of Elon Musk’s Twitter takeover has been difficult to ...
How the Retail Industry Can Boost Their Cybersecurity With XDR and MDR Services
The retail industry faces unique challenges when it comes to risk management and ...
Bitdefender Threat Debrief | October 2022
MDR Insights Cyber Security Awareness: Threat Modeling As stated by OWASP, “Threat modeling ...
AV-Comparatives Recognizes Bitdefender as Strategic Leader in Endpoint Protection and Response
Bitdefender named Strategic Leader in latest EPR report, the highest certification level ...
Cybersecurity Awareness Month – The Importance of Threat Intelligence
As the 2022 Cybersecurity Awareness Month draws to a close, it’s important for people and ...
Cybersecurity Is a People Problem: Here’s How XDR and MDR Can Help
As organizations continue to embrace digitization, security remains a top priority. ...
The History of AI Tricking Humans
In the Western world, the earliest known case of fraud was recorded in 300 BC. Since then, ...
Cybersecurity Awareness Month – Securing the Cloud
As we make our way through Cybersecurity Awareness Month, Bitdefender is continuing our blog ...
Effective Fraud Detection and Prevention with Threat Intelligence
Organizations have moved a considerable part of operations online to ease the purchase ...
The Importance of Public-Private Partnerships in the Fight Against Cybercrime
The public sector is facing a rapid rise in malicious threats. For years, the private sector ...
Cybersecurity Awareness Month – It’s About People
Every October, the National Cybersecurity Alliance (NCA) and the Cybersecurity and ...
From One Crisis to the Next: Supply Chain Issues and Climate Change
On the face of it, cybersecurity and climate change couldn’t seem more different. While both ...
Are Open-Source Threat Intelligence Solutions Still Competitive?
Nobody wants to play the losing game. But when it comes to cybersecurity, thinking on your ...
How MDR Can Help Organizations Overcome the Cybersecurity Talent Shortage
As cyber attacks grow in volume and sophistication, so too does a major shortage in the ...
Deep Dive into a Cryptojacking Operation
A new cryptojacking campaign was recently discovered by our security researchers from ...
Cybersecurity Awareness Month – Four Key Behaviors for Stronger Cyber Resilience
October is Cybersecurity Awareness Month, a collaboration between government and private ...
ESG Report: How Important is MDR to Security Teams?
With threats continuing to evolve and architectural and environmental shifts, organizations ...
How to Choose the Right Cybersecurity Solution for Your Organization
As landscapes, threats, and attack surfaces change, organizations often need to adapt and ...
Tech Explainer | What is DLL Sideloading?
Welcome to the Bitdefender tech explainer about DLL sideloading attacks! In this article, we ...
Bitdefender Threat Debrief | September 2022
MDR Insights What are hybrid attacks? In the last few years, we have seen a dramatic shift ...
Bitdefender's Historic Partnership with Ferrari F1 Racing Team
Bitdefender is excited to announce its multi-year partnership with Scuderia Ferrari, the ...
Unboxing Linux & Container Security - Common Misconceptions About CWS
Cloud computing is the powerhouse of today’s digital economy. Organizations across all ...
Meet Bitdefender at GITEX GLOBAL 2022
As THE undisputed tech event for more than 40 years, GITEX GLOBAL, taking place October 10 – ...
Achieving Sustainability and IoT Security in Digital Transformation
The COVID-19 pandemic had a dramatic effect on the environment. Due to the shift from daily ...
Actionable Threat Intelligence for Cybersecurity
The ever-changing world of cybersecurity has challenged businesses and organizations of all ...
The Evolution of Cybersecurity and Risk Management in the Healthcare Industry
2015 was a wake up call for the healthcare industry. It was the year of the healthcare ...
CIS Controls and the Fight Against Climate Change
Smart technologies and the Internet of Things (IoT) devices are revolutionizing the energy ...
Cyber Risk Mitigation in the Era of Quantum Computing
Quantum computing, once widely-viewed as little more than steampunk-inspired sci-fi fantasy, ...
Meet With Bitdefender at VB2022 in Prague
VB conference is an international cybersecurity event hosted by Virus Bulletin, a ...
Tactical Threat Intelligence – Everything You Need to Know
The ever-changing nature of cybersecurity has challenged businesses and organizations of all ...
Upgrading Cryptography to a Post-Quantum Secure State
Cybersecurity and privacy is a lofty task when taking into consideration the attack surface ...
Deep Dive into a Corporate Espionage Operation
Corporate espionage, also known as industrial espionage, is espionage conducted for ...
Three Reasons Why Organizations Need MDR
Resource constrained organizations have a cybersecurity problem. While digital ...
Bitdefender Threat Debrief | August 2022
In this month’s Threat Debrief, we asked experts from our Managed Detection and Response ...
How Will Machine Learning (ML) Tools Alter the Cyber Threat Landscape?
Artificial intelligence, or AI for short, is by no means a new phenomenon. The term has ...
Black Hat 2022 Recap: Device42, IoT Vulnerabilities & More
Bitdefender recently joined thousands of members of the international cybersecurity ...
Will Companies Need A Chief Artificial Intelligence Officer (CAIO)?
The adoption of artificial intelligence (AI) and machine learning (ML) technologies is ...
How Quantum Computing Will Change Encryption Forever
The interaction between companies and threats have always been cyclical. Threats and ...
XDR: The Latest TLA or Newest Cyber Shield?
The cybersecurity industry is full of three-letter acronyms (TLAs). Often, they are simply a ...
The AI Cyber Threat of Google LaMDA
Artificial intelligence (AI), a phrase that has been in use since the 1950s, is defined as ...
Why NAD Is Essential For Cloud Workload Security
The network is the new battlefront in cybersecurity. Hackers continue to increase the ...
Operational Threat Intelligence – A Crucial Tool For Cyber Resilience
Cyber Security is paramount in modern business as attacks are constantly evolving and ...
No More Ransom – Six Years of Innovating to Fight Ransomware Together
When talking about cybercrime, you can’t avoid the topic of ransomware. It is one of the few ...
Bitdefender and Amazon Web Services Strengthen Cloud Security
It’s no secret that cloud computing is growing rapidly. Over the past several years, ...
How XDR Can Transform MSP Cybersecurity
Your customers probably don’t ask how different technologies deploy heuristics to detect ...
Bitdefender Threat Debrief | July 2022
Managed Detection and Response (MDR) Insights Let's talk about credential leaks. Whether ...
Join Bitdefender at Black Hat 2022
Black Hat is an internationally recognized cybersecurity conference known for providing ...
Why SMBs Need To Consider Cyber Insurance
The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on ...
Bitdefender Achieves Highest Score in AV-Comparatives. Again. Why this Matters for Practitioners
On July 15th, the results of the latest Business Security Test 2022 (March – June) by ...
A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial
The threat landscape is constantly changing. A few months into the pandemic, as most human ...
Bitdefender Introduces Managed Detection and Response (MDR) Foundations
We are thrilled to announce the availability of Bitdefender MDR Foundations, a true Managed ...
How Cyber Resilience Enables Business Growth
We live in a time of unprecedented technological innovation. We are more digitally connected ...
You Were The Chosen One, XDR
Cybersecurity solutions have an intermittent success rate, albeit, not as predictable as how ...
How MDR Services Can Help Vulnerable Healthcare Organizations
Healthcare organizations have not had the best couple of years when it comes to ...
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...
Learn How to Improve Your Organization’s Cyber Resilience at Infosecurity Europe
As threat landscapes shift and organizations’ attack surfaces change, it’s important to know ...
How XDR Solutions Can Help You Achieve Zero Trust
As cyber risk continues to increase, organizations need to resort to new frameworks, ...
Bitdefender Threat Debrief | June 2022
Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability “Follina” Bitdefender has been ...
Homograph Phishing Attacks - When User Awareness Is Not Enough
Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...
Technical Advisory: CVE-2022-30190 Zero-day Vulnerability “Follina” in Microsoft Support Diagnostic Tool
Quick Overview On Monday, May 30, 2022, Microsoft issued CVE-2022-30190, a zero-day remote ...
GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads
As enterprises shift towards a cloud-first digital environment, the need to address an ...
How XDR Can Help With IoT Device Security
With the advent of digital transformation and the pandemic-driven push to remote work, ...
How to Choose a Threat Intelligence Provider
Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...
The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats
Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...
Bitdefender Threat Debrief | May 2022
MDR Insights The MDR intelligence cell recognizes the threat that comes with homograph ...
Join Bitdefender at the 2022 RSA Conference
The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...
Looking for XDR in your MDR Partner | How XDR can improve MDR
Over the last two years, it’s clear that organizations, especially enterprises, need to ...
We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022
It is the beginning of a new year, and the internet is full of articles reviewing the ...
Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More
The enterprise cybersecurity landscape has changed dramatically in recent years. The ...
Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar
Security leaders are constantly looking to further mature their security organization and ...
Bitdefender Threat Debrief | April 2022
Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with ...
SDN Security—What Is It and Why Should SMBs Care?
Small and mid-sized businesses (SBMs) have every reason to be interested in deploying ...
EDR & XDR – Security Solutions for Hybrid & Remote SMB Ecosystems
Organizations, including small and midsized businesses (SMBs), should be on the lookout for ...
Bitdefender Launches GravityZone Extended Detection and Response (XDR) to Improve Cyber Resilience
Bitdefender has a robust 20-year history innovating on behalf of our customers for superior ...
Best Practices in Patch Management for Cloud Workload Security
Over the past decade, organizations of all sizes have been increasingly migrating their ...
Why You Might Consider Working With an MSP to Obtain Cyber Insurance
Cyber insurance is quickly becoming one of the most essential cybersecurity services ...
Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response
Every endpoint in an organization – from employee computers and mobile devices, to servers, ...
Native XDR vs Open XDR
As organizations continue to grow and invest in multiple third-parties, increase their ...
Expert Insights from HIMSS 2022
The Health Information and Management Systems Society (HIMSS) conference was held earlier ...
MITRE ATT&CK® Evaluations 2022 – Why Actionable Detections Matter
On March 31st, the results of the latest round of the MITRE ATT&CK® Evaluations for ...
CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities
Zero-day vulnerabilities are among the most worrisome cyber security risks for ...
The Clock is Ticking: What To Do Immediately After a Ransomware Attack
Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...
Bitdefender Threat Debrief | March 2022
Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...
MDR—What is it and Why Should SMBs Care?
When dealing with the latest and most serious threats, cyber security leaders and teams need ...
Why Cloud Workload Security (CWS) Should Be Your 2022 Priority
The cloud is quickly becoming the most important battleground for organizations. ...
MSP Blueprint for Efficient Detection and Response
The complex security solution landscape makes it difficult for organizations to design the ...
How XDR can help protect against sophisticated threat actors
It’s not easy being a business these days. Organizations are under siege against automated ...
What is DRaaS and How Can it Benefit Smaller Companies?
One thing that’s certain about business is that nothing is certain. Unforeseen events can ...
A Guide to Cyber Insurance for 2022
The cyber insurance market is hardening and becoming more mature as years pass and the ...
Celebrating Women in Cybersecurity
A Conversation with Bitdefender’s VP of Product Marketing, Amy Blackshaw, for International ...
Bitdefender Advanced Threat Intelligence Now Available Through the ThreatBlockr Platform
From technical specialists to team leaders and business architects, security experts today ...
SMBs Need to Go on the Offensive with Cyber Security
Recently there has been a push for more proactive cyber security strategies, even to the ...
Bitdefender Wins Three AV-TEST Awards
Bitdefender has earned three prestigious Best Protection awards from AV-TEST, an independent ...
Security Advisory: A risk-based approach for improving your cybersecurity posture due to the invasion of Ukraine
We want to provide organizations with recommendations to prepare for potential cyberattacks ...
Bitdefender Threat Debrief | February 2022
Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...
What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)
It would be almost impossible to use a computer or network for business and be unaware of ...
Small Business Data Security in the Event of a Big Tech Breakup
A lot of time and energy has been spent debating the future of Big Tech, and what could ─ ...
What Are The Biggest Cyber Threats of The Future?
Cybersecurity was a growing concern even before the Internet became the dominant form of ...
Why Organizations Need to Prepare Themselves for BEC Attacks
Organizations face a number of different attacks across a variety of vectors, which is often ...
Key Security Considerations for CISOs in 2022
As CISOs (chief information security officers) and other cyber security leaders prepare for ...
The Threat Intelligence Requirement
The war against hackers and cybercriminals continues to intensify daily. As hackers become ...
Security Blueprint: How to Get Your Marketing & Goal Setting Right
A solid security blueprint helps you to provide the cybersecurity and threat protection ...
Bitdefender Threat Debrief | January 2022
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Spam Alert: EU Business Register Scams Are Back to Threaten Your Organization’s Wallet
Fraudsters behind the decade-old EU Business Register scam are wreaking havoc once again, ...
2022 Cybersecurity Predictions: Bitdefender Expert Picks
2021 wasn’t the best year for cybersecurity — if you pitted companies versus malicious ...
How to Find the Right MDR that Works With Your Organization
Managed Detection and Response or MDR, is on the cusp of becoming a mainstream cybersecurity ...
Linux and Container Security: Removing module dependencies
Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...
Bitdefender Achieves Highest Score in AV-Comparatives Security Report
We’re excited to announce that Bitdefender has been designated as a Strategic Leader in ...
Applying Operational Excellence in MDR
This is the final installment in our three-part blog series on how Bitdefender has built ...
Top 2022 Cybersecurity Predictions for the Healthcare Industry
The healthcare industry has been one of the most targeted industries over the past few years ...
Applying Operational Excellence in MDR
This is the second in a three-part blog series from Bitdefender on how we have built ...
The Proactive Guide to Small Business Cybersecurity Strategy
Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...
What is an APT?
Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...
Security Blueprint: Understanding the Sales Process & Technical Requirements
A solid security blueprint helps you provide customers with the knowledge and solutions they ...
Applying Operational Excellence in MDR
Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...
Bitdefender Threat Debrief | December 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Bitdefender Issues Top 5 Cybersecurity Predictions for 2022
This year is coming to an end, and the cybersecurity community is working hard on ...
Supply Chain Security Threats - What SMBs Need to Know
Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...
The AV Comparatives Leaderboard Is Not As Crowded As It Seems
Three things matter the most when defending an organization against cyber threats: ...
What is Cyber Insurance? (and how do I know if i need it?)
Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...
Log4Shell – The call is coming from inside the house
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
What is SASE?
Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...
Tactical Threat Intelligence: How to shield data from advanced attacks
Struck by the reality of remote collaboration, companies had to rethink both their business ...
Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
The Top Cloud Threats that SMBs Need to Address
Small and mid-sized businesses (SMBs), like global enterprises, are relying more and more on ...
Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
Tactical Threat Intelligence: What Is It and Practical Use Cases
As digital technologies continue to become central to every industry, they foster greater ...
Retail Cybersecurity: Common Threats During the Holiday Shopping Season
With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...
Bitdefender Named a 2021 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms in North America
The Bitdefender team is excited to share that we have been named a ‘Customers’ Choice’ for ...
What's Included in a Security Blueprint?
Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses ...
Bitdefender Threat Debrief | November 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Why Third-Party Testing is Critical for Informed Customer Decisions
With 400+ new threats discovered each minute and 30 billion threat queries validated daily; ...
Cloud-Native Security—What is it and Why it Matters
The term “cloud native” is turning up more and more in vendor promotions and news content, ...
The 7 Biggest Digital Threats of Black Friday and Cyber Monday
Cyber crime is causing more chaos than ever, and looms large for small business owners as ...
Bitdefender’s 20th Anniversary: A look at the past, present, and future through its people
We’re incredibly excited to celebrate Bitdefender’s 20th anniversary and thought we would ...
Small Online Retailers Face These Big Online Threats This Holiday Season
The holidays are the time that makes or breaks a large number of small online retailers, and ...
Cybersecurity in Banking: Bank hackers, ransomware, and more
The banking industry has famously been the target of many malicious hackers, leading to ...
2021 Market Guide for Managed Detection and Response Services - A Gartner Report: Thoughts from Bitdefender MDR
Gartner® released its first Market Guide for Managed Detection and Response (MDR) back in ...
How to Protect Distance Learning Against Cyber Threats
Terms such as distance learning, distance education, remote learning, cyber education, and ...
What Is RaaS and Why Is It So Dangerous?
It’s no secret that ransomware is quickly becoming the most dangerous threat to ...
Healthcare Cloud Security Explained
Years before the pandemic, the healthcare industry had already been busily digitally ...
The Future of the Container Security for SMBs
As more and more small and mid-sized businesses (SMBs) shift data and workloads to the ...
Bitdefender Celebrates 20 Years of Cybersecurity Leadership
November 2021 marks a special month for Bitdefender as we celebrate our 20th anniversary. It ...
Healthcare Threat Hunting Must Get Proactive
There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...
Why Cybersecurity Departments Need a Vendor Management Policy
Organizations have more third-parties and vendors than ever before, so much so that it’s ...
Bitdefender Threat Debrief | October 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator
The threat landscape is changing. Crimeware, a class of malware designed specifically to ...
What Is EDR and Why Is Endpoint Security So Important?
Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...
Enhancing Cyber Resilience through Extended Detection and Response (XDR)
Summary Advanced attacks represent a challenge for organizations that are getting breached ...
Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator
The threat of ransomware has grown dramatically in recent years. The recent emergence of ...
Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves
Building up a robust security department and having a strong security posture doesn’t happen ...
How Quantum Computing Will Impact Cybersecurity
The field of quantum computing is still in its early stages, but the technology will be ...
Pitfalls To Avoid With Your Security Awareness Training (SAT) Program
If you’re tasked with securing your organization, your employees are usually one of the ...
Top SMB Security Tips for Cybersecurity Awareness Month
October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...
Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter
These days, the line between our online and offline lives has become indistinguishable. Our ...
Why Healthcare IoT Requires Stronger Healthcare Cybersecurity
The healthcare industry has gone through a dramatic technological transformation, one that ...
Top 5 Healthcare Cyber Attacks and Threats
Even before the novel coronavirus pandemic, which forced healthcare organizations to shift ...
Bitdefender Threat Debrief | September 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware news, trends, ...
Why Healthcare Cybersecurity is Needed to Address Rising Modern Threats
The healthcare industry has undergone a major transformation - spurred and fast-tracked by ...
Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test
Bitdefender has once again earned the top ranking for email phishing, malware and spam ...