Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost

May 07 by Bogdan Carlescu

Security operations are expensive! Hiring, training, and keeping a team of security analysts demands significant resources from any organization wanting to run security operations in-house. There are many studies which show the urgent need to improve security operations center (SOC) analysts’ productivity.

Read More

Defending against Email Threats that Don’t Involve Malware

May 05 by Mia Thompson
  • The threat landscape continues to evolve in terms of complexity
  • Email is still the weakest link in the security chain and neglecting email security can leave your customers’ networks vulnerable to attacks
  • Many legacy solutions can’t fend off today’s modern attacks
  • Investment in modern email security is essential to protect against sophisticated attacks
Read More

The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant

May 05 by Bob Violino
  • Ensuring data privacy is now a worldwide concern, with many countries adopting data protection laws
  • Much work still needs to be done to ensure the privacy of information
  • Tools and training are keys to success
Read More

The Curse of Telnet, an IoT Problem that Doesn't Want to Go Away

Apr 26 by Silviu Stahie
  • An unsecure communication protocol proves to be a headache in today's world
  • Despite its age and problems, Telnet sticks around
  • The mitigation of Telnet security problems is possible with the right solution
Read More

Decoding the MITRE Engenuity ATT&CK® EVALUATIONS 2021 Results

Apr 23 by Bogdan Carlescu

On April 20th, the results of the latest round of the annual MITRE ATT&CK® Evaluation of security solutions were released. This year, a field of 29 security solutions from leading cybersecurity companies including Bitdefender, Crowdstrike, and Microsoft were tested on their ability to detect the techniques and tactics of Carbanak and FIN7.

Read More

Content is Key, but Is Also a Door for Spreading Malware

Apr 21 by Andrei Pisau

Since the onset of the current health crisis, many systems have found themselves strained. From remote work platforms to collaboration software, most services have been affected by the heavy traffic and the necessity to accommodate large numbers of users.

Read More

Considering Endpoint Detection and Response? What’s the best EDR choice for your business?

Apr 20 by Peter Craig

“We are our choices”  (John Paul Sartre) 

Read More

Considering McAfee Alternatives? Make Replacement an Upgrade

Apr 19 by Peter Craig

“When in doubt, choose change.”  (Lily Leung)  

  • McAfee has agreed to sell its enterprise business
  • Many McAfee customers may be considering alternatives 
  • Don’t just replace - upgrade 
Read More

Bitdefender Launches Major Enhancements to its Global Partner Program

Apr 15 by Steve FIORE

The global cybersecurity landscape has changed dramatically over the past year due to the COVID-19 pandemic as adversaries look to use the outlier event to their advantage. 

Read More

DHS Official: Cybersecurity a "top priority" for Biden Administration

Apr 12 by George V. Hulme
  • S. Secretary of Homeland Security details Federal Cybersecurity Strategy.
  • Initial focus on ransomware, workforce, industrial control security.
  • The federal government needs to take a risk-based, long-term view on cybersecurity.
Read More

New Bitdefender Report Highlights Unique Security Challenges of 2020

Apr 07 by Bob Violino
  • Ransomware, banking malware, unwanted applications, and Android attacks all rose significantly
  • Pandemic-related incidents had a big impact
  • Similar threats expected for this year, and cyber security teams need to have the right security tools in place


Read More

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Apr 02 by George V. Hulme
  • Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
  • Such breach disclosure laws have been long found over legal concerns.
  • The EO would also establish that certain software vendors maintain a software bill of materials.
Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month