Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain access to an organization’s network systems over a long period of time in order to covertly steal sensitive information or drain financial resources.
All about Virtualization and Cloud Security | Recent Articles:
- EDR and MDR represent two viable paths to achieving successful security defense
- Internal teams use EDR tools to launch investigations and guide remediation actions
- MDR brings professional cross-skilled security analysts and proactive threat hunters
- Security tipping point is determined by gaps in time, skills, efficiency and outcomes
- Efforts have long been underway to create more advanced cryptography, and the market appears ready to deploy these solutions
- Promising new approaches include quantum key distribution, biometrics encryption, and homomorphic encryption
A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)
This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems.
- Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts
- Always revoke the access rights of former employees and contractors
- 53% of Web traffic is now cloud-related, a 20% year over year increase.
- 61% of all malware is directly delivered via the cloud.
- Malicious Office documents represented 17% of all malware detected.
- Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
- Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
- Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]
Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to remote work and cloud-based operations continues to create security blind spots attackers can exploit. With the SolarWinds breach sending ripples well into the future, supply chain attacks are top of mind. Now is the best time to consider a truly robust cybersecurity tool stack, as no technology layer can prevent attacks that silently climb the supply chain ladder.
What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess
- Mistaken assumptions about smart home cybersecurity lead to more problems
- We put much trust in a particular IoT device, but we don't secure it enough
- There's always a solution, no matter the security issue
Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations
We understand the public announcement of several critical zero-day vulnerabilities in Microsoft Exchange server is concerning for our customers. This communication details how Bitdefender is responding to ensure customers are protected and provides recommended mitigation steps you can take against this threat.
Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm
Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the most respected independent testing organizations in cybersecurity, awarded Bitdefender with four Best Protection awards.
- Have we reached a tipping point where providing for your own cyber-defense no longer makes sense?
- Could you achieve better overall security outcomes by partnering with a top MDR service provider?
- Have you considered the critical decision factors that could tip the balance between EDR and MDR?
- Do you know which questions to ask when considering a prospective MDR service provider?
- More people are using wearable devices such as smartwatches, in part because of the work-from-home model
- These devices store growing volumes of personal data and in many cases are connected to corporate resources, presenting potential security risks
Filling positions in the information technology career field, particularly in cybersecurity, can present unique challenges. Companies and organizations have realized the vital role cybersecurity plays in daily operations, including protection of company assets from cybercrimes such as DDoS attacks, ransomware, and advanced phishing campaigns. Skilled cybersecurity professionals are being recruited to alleviate these risks and take measures to prevent breaches. Finding suitable candidates can prove difficult, as interviewers must account for the candidate’s analytical and technical skills and determine if the individual would be a good fit for the team and culture. This blog will explain how Bitdefender’s Security Operations Center (SOC) approaches this common challenge by focusing mainly on candidates’ analytical and problem-solving skills. We will also address our views on questions of technical and cultural fit.
- 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
- Less than one in five executives say they want to return to the office as it was pre-pandemic.
- Enterprises are going to have to balance convenience and security over the long haul.
- Be the voice of authority by tracking market trends for your audience
- Connect content with action; help them see the why and how to act
- Failing to respond to mark shifts can have devastating consequences
This blog post was authored by Michael Reeves, CISSP, Cloud and MSP Security Architect
- Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems
- Learning from available security-related data is a necessary step to strengthen the IoT industry
- The current state of IoT security requires an outside security solution that acts an equalizer
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (8)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (25)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (82)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2021 (3)
- March 2021 (18)
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)