Ransomware Remains A Major Threat—Here’s How Organizations Can Defend Themselves
Ransomware attacks are on the rise and costing companies millions of dollars, and ...
Who’s Responsible For Cybersecurity When You Work from Home?
The ability to work from home seems to have seeped into people's consciousness like it's ...
Assessing Your Security Gaps
IT security teams face the challenge of a complex, evolving threat landscape Threats are ...
Detecting and Stopping Malware Threats Within Your Content Delivery Networks
CDN providers and SaaS companies with content-sharing components (such as DropBox, ...
Bitdefender’s Position on Ransomware Attacks and Decryptors
This week Bitdefender was named in a press article regarding our decision to release a free ...
A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)
In the third and last part of the blog series on Practical Cyber Resilience, I will cover ...
Honoring Our 2021 CRN Women of the Channel
We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather ...
Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals
On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on ...
Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events
As new threats hit enterprise systems and light up enterprise security dashboards, security ...
Digital Transformation Shouldn’t Require a Security Transformation
It’s often asked, why can’t security innovate more?
It's Time Security Teams Begin Prep for Quantum Computing
It seems that every week new news breaks regarding the progress toward reaching practical ...
Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations
Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...


