Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm

Mar 11 by Steve FIORE

Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the most respected independent testing organizations in cybersecurity, awarded Bitdefender with four Best Protection awards.

Read More

Is Security at a Tipping Point? Should You Still Go It Alone?

Mar 11 by Michael Rosen
  • Have we reached a tipping point where providing for your own cyber-defense no longer makes sense?
  • Could you achieve better overall security outcomes by partnering with a top MDR service provider?
  • Have you considered the critical decision factors that could tip the balance between EDR and MDR?
  • Do you know which questions to ask when considering a prospective MDR service provider?
Read More

Wearable Devices are on the Rise, Presenting New Security Risks

Mar 11 by Bob Violino
  • More people are using wearable devices such as smartwatches, in part because of the work-from-home model
  • These devices store growing volumes of personal data and in many cases are connected to corporate resources, presenting potential security risks
Read More

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

Mar 10 by Bogdan Carlescu
In a previous blog, I looked at the key differences between cybersecurity and cyberresilience, and why cyberresilience is a better approach for organizations to follow in 2021 because it is holistic.
Read More

A Focused Approach to the Common Interview Process

Mar 08 by Landon Woolridge

Filling positions in the information technology career field, particularly in cybersecurity, can present unique challenges. Companies and organizations have realized the vital role cybersecurity plays in daily operations, including protection of company assets from cybercrimes such as DDoS attacks, ransomware, and advanced phishing campaigns. Skilled cybersecurity professionals are being recruited to alleviate these risks and take measures to prevent breaches. Finding suitable candidates can prove difficult, as interviewers must account for the candidate’s analytical and technical skills and determine if the individual would be a good fit for the team and culture. This blog will explain how Bitdefender’s Security Operations Center (SOC) approaches this common challenge by focusing mainly on candidates’ analytical and problem-solving skills.  We will also address our views on questions of technical and cultural fit.

Read More

Remote Work and the Long-Term Impact on Risk

Mar 04 by George V. Hulme
  • 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
  • Less than one in five executives say they want to return to the office as it was pre-pandemic.
  • Enterprises are going to have to balance convenience and security over the long haul.
Read More

Technology Providers: Would You Rather be Blockbuster or Netflix?

Mar 03 by Mike Reeves, CISSP
  • Be the voice of authority by tracking market trends for your audience
  • Connect content with action; help them see the why and how to act
  • Failing to respond to mark shifts can have devastating consequences

This blog post was authored by Michael Reeves, CISSP, Cloud and MSP Security Architect

Read More

Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities

Mar 02 by Silviu Stahie
  • Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems
  • Learning from available security-related data is a necessary step to strengthen the IoT industry
  • The current state of IoT security requires an outside security solution that acts an equalizer
Read More

Considering Endpoint Detection and Response? Level up your defenses with Bitdefender EDR

Feb 25 by Peter Craig

“The most damaging phrase in the language is 'We've always done it this way'.” 

Rear Admiral Grace Murray Hopper 

    • Have you always done endpoint security the same way? 
    • Are there gaps in your defenses today that you need to address? 
    • This article discusses these gaps and invites you to an online seminar that will show how these can be addressed with Endpoint Detection and Response solutions. 
Read More

Are you ready for the post-spam era?

Feb 22 by Adrian Miron

Augment your email security solution for today’s challenges.

Read More

Bolstering Industrial Cyber Security in the Age of IoT

Feb 22 by Bob Violino
  • Security for industrial infrastructures is likely to get more attention with the continuing growth of the Internet of Things
  • The global industrial cyber security market is expected to grow 8% between 2020 and 2027, according to research by Fortune Business Insights
  • Among the emerging market trends is the integration of industrial cyber security products with advanced cloud services, needed to monitor and analyze growing volumes of data
Read More

Misconfigurations: An Open Door to Compromise and Data Breaches

Feb 18 by Filip Truta
  • Endpoint misconfiguration accounts for 27 percent of entry points exploited by attackers today
  • As enterprises increasingly move workloads to the cloud, overburdened IT administrators frequently misconfigure accounts, applications and components
  • Organizations typically lack formal, systematic hardening processes and policies to close security gaps
  • IT reps require integrated endpoint configuration risk analysis at the heart of their security operations
Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets