Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

Mar 31 by Steve FIORE

Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain access to an organization’s network systems over a long period of time in order to covertly steal sensitive information or drain financial resources. 

Read More

EDR or MDR: Two Paths to Successful Security Defense

Mar 29 by Mia Thompson
  • EDR and MDR represent two viable paths to achieving successful security defense
  • Internal teams use EDR tools to launch investigations and guide remediation actions
  • MDR brings professional cross-skilled security analysts and proactive threat hunters
  • Security tipping point is determined by gaps in time, skills, efficiency and outcomes
Read More

Advanced Encryption will be Key to Future Cyber Security Efforts

Mar 25 by Bob Violino
  • Efforts have long been underway to create more advanced cryptography, and the market appears ready to deploy these solutions
  • Promising new approaches include quantum key distribution, biometrics encryption, and homomorphic encryption
Read More

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

Mar 25 by Bogdan Carlescu

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems.


Read More

Businesses! Beware The Vengeful IT Contractor!

Mar 24 by Graham Cluley
  • Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts
  • Always revoke the access rights of former employees and contractors
Read More

Malware Delivered Via Cloud Services Rises

Mar 23 by George V. Hulme
  • 53% of Web traffic is now cloud-related, a 20% year over year increase.
  • 61% of all malware is directly delivered via the cloud.
  • Malicious Office documents represented 17% of all malware detected.
Read More

Big Enterprise IoT Device Security Considerations

Mar 22 by George V. Hulme
  • Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
  • Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
  • Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
Read More

Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]

Mar 22 by Filip Truta

Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to remote work and cloud-based operations continues to create security blind spots attackers can exploit. With the SolarWinds breach sending ripples well into the future, supply chain attacks are top of mind. Now is the best time to consider a truly robust cybersecurity tool stack, as no technology layer can prevent attacks that silently climb the supply chain ladder.

Read More

What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess

Mar 19 by Silviu Stahie
  • Mistaken assumptions about smart home cybersecurity lead to more problems
  • We put much trust in a particular IoT device, but we don't secure it enough
  • There's always a solution, no matter the security issue
Read More

Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations

We understand the public announcement of several critical zero-day vulnerabilities in Microsoft Exchange server is concerning for our customers. This communication details how Bitdefender is responding to ensure customers are protected and provides recommended mitigation steps you can take against this threat.

Read More

Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm

Mar 11 by Steve FIORE

Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the most respected independent testing organizations in cybersecurity, awarded Bitdefender with four Best Protection awards.

Read More

Is Security at a Tipping Point? Should You Still Go It Alone?

Mar 11 by Michael Rosen
  • Have we reached a tipping point where providing for your own cyber-defense no longer makes sense?
  • Could you achieve better overall security outcomes by partnering with a top MDR service provider?
  • Have you considered the critical decision factors that could tip the balance between EDR and MDR?
  • Do you know which questions to ask when considering a prospective MDR service provider?
Read More

Wearable Devices are on the Rise, Presenting New Security Risks

Mar 11 by Bob Violino
  • More people are using wearable devices such as smartwatches, in part because of the work-from-home model
  • These devices store growing volumes of personal data and in many cases are connected to corporate resources, presenting potential security risks
Read More

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

Mar 10 by Bogdan Carlescu
In a previous blog, I looked at the key differences between cybersecurity and cyberresilience, and why cyberresilience is a better approach for organizations to follow in 2021 because it is holistic.
Read More

A Focused Approach to the Common Interview Process

Mar 08 by Landon Woolridge

Filling positions in the information technology career field, particularly in cybersecurity, can present unique challenges. Companies and organizations have realized the vital role cybersecurity plays in daily operations, including protection of company assets from cybercrimes such as DDoS attacks, ransomware, and advanced phishing campaigns. Skilled cybersecurity professionals are being recruited to alleviate these risks and take measures to prevent breaches. Finding suitable candidates can prove difficult, as interviewers must account for the candidate’s analytical and technical skills and determine if the individual would be a good fit for the team and culture. This blog will explain how Bitdefender’s Security Operations Center (SOC) approaches this common challenge by focusing mainly on candidates’ analytical and problem-solving skills.  We will also address our views on questions of technical and cultural fit.

Read More

Remote Work and the Long-Term Impact on Risk

Mar 04 by George V. Hulme
  • 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
  • Less than one in five executives say they want to return to the office as it was pre-pandemic.
  • Enterprises are going to have to balance convenience and security over the long haul.
Read More

Technology Providers: Would You Rather be Blockbuster or Netflix?

Mar 03 by Mike Reeves, CISSP
  • Be the voice of authority by tracking market trends for your audience
  • Connect content with action; help them see the why and how to act
  • Failing to respond to mark shifts can have devastating consequences

This blog post was authored by Michael Reeves, CISSP, Cloud and MSP Security Architect

Read More

Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities

Mar 02 by Silviu Stahie
  • Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems
  • Learning from available security-related data is a necessary step to strengthen the IoT industry
  • The current state of IoT security requires an outside security solution that acts an equalizer
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets

Posts by Month