Common IoT Threats and the Role of ISPs in Protecting Our Homes
To fix a problem you first need to know of its existence IoT devices are often the target of ...
Most Companies in US and Canada Gather User Data through Third-Party Code without Telling Customers, Survey Finds
Advertisers usually use gathered data to better target customers Most companies allow some ...
ICO Calls on UK Businesses to Ensure Lawful Flow of Data Under GDPR as Brexit Transition Period Ends
SMEs must check whether they are impacted before the end of the UK’s transition period with ...
Most Employees Think It’s the Company’s Job to Secure Their Work Accounts
59% of employed Americans are more concerned about creating a strong password for personal ...
Organizations Relied More in 2020 on Crowdsourced Cybersecurity, Report Finds
Companies need bug bounty platforms now more than ever The increase in the number of threats ...
Poor Security Habits Might Force Companies to Bring Employees Back to the Office
69% admit to using corporate devices for personal use 57% say they allow other members of ...
Bitdefender Looks Ahead at the Threat Landscape of 2021
As 2020 is finally and fortunately coming to an end, here at Bitdefender, we’re already ...
Most Industries Plan Substantial Investments in IT to Support Remote Workers in 2021
Organizations don’t want to be caught off-guard again by a COVID-like crisis Most industries ...
Bitdefender Endpoint Detection and Response, The Vaccine You Need for Advanced Threats
Advanced targeted threats are designed with a defined purpose to infect and remain ...
Half of Cybersecurity Seniors Have Changed Their Defense Strategies Due to COVID-19
23% admitted experiencing a remote attack or disruption since the beginning of the pandemic ...
61% of IT Security Leaders Say Remote Workers Have Caused a Data Breach This Year
Employees are 85% more likely today to leak files than pre-COVID 59% of IT security leaders ...
Bitdefender’s Response to FireEye and SolarWinds Breaches and Recommendations for Organizations
The recent breaches making headlines is a stark reminder that no organization is immune to ...
Half of Businesses Say Remote Work Pays Off, But Security Is Becoming a Major Concern
Nearly a quarter of organizations worry about security risks introduced by users working ...
How to Choose a Reliable Security Licensing Provider
The security landscape, as well as the fast-growing market behind it, can be highly ...
No-code, Low-code Development: An Enterprise Priority With Data Risks
Demand for digital transformation is driving low code development platforms. While ...
How Licensing Can Help Your Business Grow
While economies were slowed down by the recent health crisis, the same cannot be said about ...
New Spear-phishing Campaign Targets Office 365 Users
Attackers spoof the Microsoft.com domain Lookalike websites used to steal credentials ...
Should Businesses Be Concerned About Nation-State Threats?
With malware increasingly adopting the “as-a-service” business model, Advanced Persistent ...
FBI and CISA Roll Out Best Practices to Serve as a Cornerstone of Organizations’ Cybersecurity Strategies
Feds offer advice on how to build and maintain a strong cybersecurity posture in the face of ...
When the ISP Becomes the Weakest Link in the Cyberattack Kill Chain
People are not always the weakest link Trickbot was hit, but it’s operators are trying to ...
5G Adoption Will Require Hiring Skilled Security Experts, Business Professionals Say
4% of professionals currently use 5G and 80.7% plan to adopt 5G in the year ahead 30% ...
Stay Competitive with Minimum Cost – Upgrade Your Offer with Licensed Technology
If the countless cyber attacks from the past months have made anything clear, it’s that ...
How They Did It: New Infographic Dissects Complete Chinese APT Attack Cycle
New Infographic breaks down the key attack stages and specific detections revealed by ...
5 Signs Spoofing Still Remains One of Cybersecurity's Biggest Problems
624,000 U.S. security brokers recently targeted by FINRA spoofing attempts 50,000 fake login ...
IoT Security Bill Signed Into U.S. Law
Too many IoT devices ship from the manufacturer with vulnerabilities and inadequate ways to ...
Organizations Adopting Cloud-Native Apps Struggle with Security Issues Stemming from API Sprawl, Survey Shows
86% of respondents say their organization is actively using or has started using ...
What Does Self-Service Security Do for AppSec?
DevOps teams with high levels of security integration are more than twice as likely to use ...
Market Study: Security Concerns Up—Mitigation Efforts Down
Fewer organizations are taking steps to mitigate cyber security risks compared with a year ...
Cloud Security Is a Primary Concern for Most Companies and Decision Makers, Report Finds
Data loss is one of the issues most companies fear Many organizations continue to implement ...
FBI Warns of Hackers Abusing Email Forwarding Rules in Recent Attacks
Remote-working has seen wider use of web-based email services Hackers have compromised ...
Bitdefender Launches New Dedicated Endpoint Detection and Response (EDR) Product and Some Important GravityZone Enhancements
Bitdefender Endpoint Detection and Response is our new EDR product that supplements any ...


