Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess

Mar 19 by Silviu Stahie
  • Mistaken assumptions about smart home cybersecurity lead to more problems
  • We put much trust in a particular IoT device, but we don't secure it enough
  • There's always a solution, no matter the security issue
Read More

Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations

We understand the public announcement of several critical zero-day vulnerabilities in Microsoft Exchange server is concerning for our customers. This communication details how Bitdefender is responding to ensure customers are protected and provides recommended mitigation steps you can take against this threat.

Read More

Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm

Mar 11 by Steve FIORE

Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the most respected independent testing organizations in cybersecurity, awarded Bitdefender with four Best Protection awards.

Read More

Is Security at a Tipping Point? Should You Still Go It Alone?

Mar 11 by Michael Rosen
  • Have we reached a tipping point where providing for your own cyber-defense no longer makes sense?
  • Could you achieve better overall security outcomes by partnering with a top MDR service provider?
  • Have you considered the critical decision factors that could tip the balance between EDR and MDR?
  • Do you know which questions to ask when considering a prospective MDR service provider?
Read More

Wearable Devices are on the Rise, Presenting New Security Risks

Mar 11 by Bob Violino
  • More people are using wearable devices such as smartwatches, in part because of the work-from-home model
  • These devices store growing volumes of personal data and in many cases are connected to corporate resources, presenting potential security risks
Read More

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

Mar 10 by Bogdan Carlescu
In a previous blog, I looked at the key differences between cybersecurity and cyberresilience, and why cyberresilience is a better approach for organizations to follow in 2021 because it is holistic.
Read More

A Focused Approach to the Common Interview Process

Mar 08 by Landon Woolridge

Filling positions in the information technology career field, particularly in cybersecurity, can present unique challenges. Companies and organizations have realized the vital role cybersecurity plays in daily operations, including protection of company assets from cybercrimes such as DDoS attacks, ransomware, and advanced phishing campaigns. Skilled cybersecurity professionals are being recruited to alleviate these risks and take measures to prevent breaches. Finding suitable candidates can prove difficult, as interviewers must account for the candidate’s analytical and technical skills and determine if the individual would be a good fit for the team and culture. This blog will explain how Bitdefender’s Security Operations Center (SOC) approaches this common challenge by focusing mainly on candidates’ analytical and problem-solving skills.  We will also address our views on questions of technical and cultural fit.

Read More

Remote Work and the Long-Term Impact on Risk

Mar 04 by George V. Hulme
  • 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
  • Less than one in five executives say they want to return to the office as it was pre-pandemic.
  • Enterprises are going to have to balance convenience and security over the long haul.
Read More

Technology Providers: Would You Rather be Blockbuster or Netflix?

Mar 03 by Mike Reeves, CISSP
  • Be the voice of authority by tracking market trends for your audience
  • Connect content with action; help them see the why and how to act
  • Failing to respond to mark shifts can have devastating consequences

This blog post was authored by Michael Reeves, CISSP, Cloud and MSP Security Architect

Read More

Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities

Mar 02 by Silviu Stahie
  • Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems
  • Learning from available security-related data is a necessary step to strengthen the IoT industry
  • The current state of IoT security requires an outside security solution that acts an equalizer
Read More

Considering Endpoint Detection and Response? Level up your defenses with Bitdefender EDR

Feb 25 by Peter Craig

“The most damaging phrase in the language is 'We've always done it this way'.” 

Rear Admiral Grace Murray Hopper 

    • Have you always done endpoint security the same way? 
    • Are there gaps in your defenses today that you need to address? 
    • This article discusses these gaps and invites you to an online seminar that will show how these can be addressed with Endpoint Detection and Response solutions. 
Read More

Are you ready for the post-spam era?

Feb 22 by Adrian Miron

Augment your email security solution for today’s challenges.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets