- Bitdefender Endpoint Detection and Response is our new EDR product that supplements any third-party endpoint security solution
- GravityZone gets a new executive dashboard and an enhanced SIEM connector
- All Bitdefender EDR products now feature custom EDR detection rules capabilities
All about Virtualization and Cloud Security | Recent Articles:
Bitdefender Launches New Dedicated Endpoint Detection and Response (EDR) Product and Some Important GravityZone Enhancements
Dec 02
by
Bitdefender Enterprise
Most Executives Worry about Security Risks Accompanying Remote Workers, Survey Finds
Nov 29
by
Silviu Stahie
- IT executives fear that people working from home bring new and unknown risks
- Some companies can’t keep pace with the rhythm of changes in cybersecurity
- The current remote workforce scenario is likely to remain in place for the next 18 months
New Bitdefender EDR for MSPs, Ransomware Mitigation and additional enhancements
Nov 27
by
Cristian Iordache
- New lightweight Endpoint Detection and Response (EDR) product that works alongside third-party AV/Endpoint Security products
- New Ransomware Mitigation – Ability to restore files encrypted in a ransomware attack from tamper-proof copies (Available from the console for all MSPS without extra cost)
- Risk Analytics enhancements – Calculate risk scores taking into account the industry and specific threats and toggle user activity monitoring on/off
- New Executive Dashboard - Get all the key information around detections and security posture for customer companies in an easy-to-use visual format that can be shared with clients
Business Interruption Is the Main Cost Driver of Cyber Insurance Claims, Says Allianz
Nov 27
by
Filip Truta
- External attacks cause the most costly cyber losses, but internal incidents like human error or systems failure are more frequent
- Inability to access data or services can affect revenues significantly, given growing reliance on online sales
- Rise in ransomware attacks, the cost of lmega breaches and the Covid-19 working landscape present significant cyber risks for the future
Automation to Drive Tidal Wave of Spear Phishing Campaigns in 2021, Researchers Predict
Nov 26
by
Filip Truta
- Email remains the biggest threat to corporate infrastructures
- Cyber-criminals are creating tools that automate the manual aspects of phishing attacks – especially spear phishing campaigns
- By combining automation with programs that scan data from social media networks and company websites, phishers can send detailed, believable spear phishing emails, with content customized to each victim
US Organizations Hit by Ransomware More than Rest of the World Combined, New Research Shows
Nov 25
by
Filip Truta
- 57% of all ransomware attacks tracked by the company in 2020 took place in the US
- Ransom payments in 2020 average roughly $176,000 per victim
- In 2020, ransomware operators focused almost exclusively on organizations staffing tens of thousands of employees
A recent look at the state of ransomware in 2020 reveals that the US has seen more targeted attacks than any other country. In fact, all other countries combined haven’t suffered enough attacks to equal the States.
- The benefits of connected medical devices outweigh the risks.
- Despite remote security risks, businesses failing to take basic steps to mitigate risk
- Still, many enterprises believe increased remote work will remain long after the pandemic passes
- There are steps enterprises should take to mitigate data security risks
Business Sector Increasingly Adopting AI Cybersecurity to Tackle Advanced Threats
Nov 24
by
Filip Truta
- Report presents changing perspectives of cybersecurity globally
- Nearly half of organizations plan to extend cognitive and AI capabilities for security to detect and respond to attacks faster
- Researchers note an increase in R&D, with half of worldwide cybersecurity-related patents filed in the last four years focusing on AI and ML
- IoT devices are everywhere and many users don’t even realize they own such hardware
- Some of the largest DDoS devices originate from IoT botnets
- Security is now in the hands of ISP and smart routers
- The benefits of connected medical devices outweigh the risks.
- While healthcare organizations know what steps they must take to secure these devices, the right precautions aren't taken
- too often.
- Security deficiencies include lack of network segmentation, poor implementation of encryption and protocols.
The Cost of Cybersecurity Incidents Is on the Rise, Mainly Due to Human Error or Systems Failure
Nov 20
by
Silviu Stahie
- The number of cyber insurance claims is on the rise since 2016
- Business interruption is more expensive than the incident itself
- Ransomware is responsible for more than $100 billion in losses
- Remote work and cloud computing contribute to increase in ransomware attacks
- Healthcare industry most vulnerable during pandemic
- 54% of MSPs say phishing is the most successful ransomware attack vector
- One in four MSPs reported ransomware attacks on clients’ SaaS applications
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threat (4)
- APT (4)
- artificial intelligence (2)
- biometrics authentication (1)
- botnet (1)
- breach (3)
- bug bounty (1)
- business sabotage (1)
- business security (4)
- BYOD (28)
- CIO (12)
- CIRA 2020 Cybersecurity Report (1)
- CISO (16)
- cloud breach (1)
- cloud misconfiguration (2)
- Cloud Security (120)
- cloud-based apps (1)
- connected care (1)
- container security (1)
- corporate hijacking (3)
- covid-19 (2)
- credit card (3)
- cryptocurrency (7)
- cryptojacking (8)
- cryptomining (4)
- cyber insurance (2)
- Cyber Security Awareness Month (5)
- cyber threats (1)
- cyber-attack (10)
- cybersecurity awareness (26)
- data breach (30)
- data breaches (1)
- Data Protection (75)
- data protection act (3)
- datacenter (3)
- DevOps (10)
- EDR (5)
- Elasticsearch server (1)
- endpoint detection and response (1)
- Endpoint Protection & Management (18)
- Enterprise Security (424)
- Equifax (2)
- Events (4)
- FBI (1)
- financial services (15)
- garter (1)
- GDPR (21)
- General Data Protection Regulation (4)
- government alert (1)
- Healthcare (20)
- honeypot (1)
- HVI (1)
- hyperconverged infrastructure (1)
- hypervisor (15)
- hypervisor introspection (11)
- identity theft (4)
- Industries (33)
- insider threats (14)
- Integration (2)
- IoT (13)
- IoT botnet (2)
- IoT, Policy, security (9)
- IT Compliance & Regulations (32)
- Linux (1)
- Machine Learning (7)
- malware, threats (14)
- managed detection and response (1)
- managed services provider (3)
- memory introspection (12)
- Microsoft (3)
- misconfigured servers (1)
- mobile security (1)
- MSP (3)
- Network Protection (12)
- online sabotage (1)
- phishing (2)
- power grid (4)
- ransomware (9)
- ransomware, HVI (3)
- remote work (7)
- report (1)
- security (2)
- Security as a Service (15)
- Security Threats (61)
- SMB Security (44)
- Software-defined-datacenter (5)
- telecommunications (2)
- unsecure database (1)
- Virtualization & Data Center Security (70)
- vulnerability disclosure policy (1)
- WDATP (1)
- wfh (2)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- January 2021 (6)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)