Detecting and Stopping Malware Threats Within Your Content Delivery Networks
CDN providers and SaaS companies with content-sharing components (such as DropBox, ...
Bitdefender’s Position on Ransomware Attacks and Decryptors
This week Bitdefender was named in a press article regarding our decision to release a free ...
A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)
In the third and last part of the blog series on Practical Cyber Resilience, I will cover ...
Honoring Our 2021 CRN Women of the Channel
We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather ...
Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals
On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on ...
Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events
As new threats hit enterprise systems and light up enterprise security dashboards, security ...
Digital Transformation Shouldn’t Require a Security Transformation
It’s often asked, why can’t security innovate more?
It's Time Security Teams Begin Prep for Quantum Computing
It seems that every week new news breaks regarding the progress toward reaching practical ...
Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations
Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...
Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption
Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a ...
How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost
Security operations are expensive! Hiring, training, and keeping a team of security analysts ...
Defending against Email Threats that Don’t Involve Malware
phisThe threat landscape continues to evolve in terms of complexity Email is still the ...
The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant
Ensuring data privacy is now a worldwide concern, with many countries adopting data ...


