Get more value from your threat intelligence

Many cybersecurity organizations are of the opinion that threat intelligence can prevent, or ...

CISOs require infrastructure-agnostic security and visibility to support data center modernization, survey shows

Conventional endpoint security solutions - originally designed for hardware-defined, ...

Financial services industry among top targets of cyberattacks

In 2017, global spending on cybersecurity totaled about $86.4 billion, while in 2018 ...

Major hacks in 2017 and what enterprises can expect from the threat landscape in 2018

Each December, security researchers make predictions for the following year, and they always ...

Connected care industry seen growing to €6 billion by 2022; GDPR to bring challenges

We’re on the verge of a complete transformation of healthcare, as traditional telecare is ...

Bitdefender Joins Xen Project Advisory Board

Bitdefender has been named an Advisory Board member for the Linux Foundation-hosted Xen ...

Limitations of Machine Learning algorithms in malware detection

There’s been a continuous increase in the use of Machine Learning but, despite the recent ...

When it Comes to Security and the Public Cloud, Organizations Still Have Lots to be Concerned About

Fears about the security and privacy of data stored in the cloud seem to have decreased ...

Security and performance required to support data center transformation, survey shows

A new Bitdefender survey reveals that security is best argument for enabling datacenters’ ...

Predictions for 2018: zero-day exploits leaked from security agencies, next-level ransomware

As 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the ...

Ransomware, Digital Currency Miners dominate the threat landscape in 2017, Bitdefender study shows

The past few months have spurred a dramatic reshaping of the threat landscape. Traditional ...

Cities Would Be Smart to Deploy Strong Cyber Security Measures as They Build More Connected Infrastructures

We’re hearing more and more about smart cities, as the Internet of Things, artificial ...

Cloud computing and the amplified insider threat

When it comes to insider threats, the nature of the threats is largely the same regardless ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW