As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare
Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain ...
EDR or MDR: Two Paths to Successful Security Defense
EDR and MDR represent two viable paths to achieving successful security defense Internal ...
Advanced Encryption will be Key to Future Cyber Security Efforts
Efforts have long been underway to create more advanced cryptography, and the market appears ...
A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)
This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I ...
Businesses! Beware The Vengeful IT Contractor!
Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts Always revoke the ...
Malware Delivered Via Cloud Services Rises
53% of Web traffic is now cloud-related, a 20% year over year increase. 61% of all malware ...
Big Enterprise IoT Device Security Considerations
Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 ...
Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]
Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to ...
What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess
Mistaken assumptions about smart home cybersecurity lead to more problems We put much trust ...
Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations
We understand the public announcement of several critical zero-day vulnerabilities in ...
Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm
Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the ...
Is Security at a Tipping Point? Should You Still Go It Alone?
Have we reached a tipping point where providing for your own cyber-defense no longer makes ...
Wearable Devices are on the Rise, Presenting New Security Risks
More people are using wearable devices such as smartwatches, in part because of the ...
A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series
In a previous blog, I looked at the key differences between cybersecurity and cyber ...
A Focused Approach to the Common Interview Process
Filling positions in the information technology career field, particularly in cybersecurity, ...
Remote Work and the Long-Term Impact on Risk
83% of employers now say the shift to remote work has been successful for their company, ...
Technology Providers: Would You Rather be Blockbuster or Netflix?
Be the voice of authority by tracking market trends for your audience Connect content with ...
Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities
Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems ...


