Applying Operational Excellence in MDR

This is the second in a three-part blog series from Bitdefender on how we have built ...

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on ...

The AV Comparatives Leaderboard Is Not As Crowded As It Seems

Three things matter the most when defending an organization against cyber threats: ...

What is Cyber Insurance? (and how do I know if i need it?)

Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...

Log4Shell – The call is coming from inside the house

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

What is SASE?

Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...

Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

Tactical Threat Intelligence: What is it and practical use cases

As digital technologies continue to become central to every industry, they foster greater ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW