The AI Cyber Threat of Google LaMDA
Artificial intelligence (AI), a phrase that has been in use since the 1950s, is defined as ...
Bitdefender Threat Debrief | July 2022
Managed Detection and Response (MDR) Insights Let's talk about credential leaks. Whether ...
Join Bitdefender at Black Hat 2022
Black Hat is an internationally recognized cybersecurity conference known for providing ...
Why SMBs Need To Consider Cyber Insurance
The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on ...
A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial
The threat landscape is constantly changing. A few months into the pandemic, as most human ...
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...
How to Choose a Threat Intelligence Provider
Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with ...
Native XDR vs Open XDR
As organizations continue to grow and invest in multiple third-parties, increase their ...
CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities
Zero-day vulnerabilities are among the most worrisome cyber security risks for ...
The Clock is Ticking: What to do immediately after a ransomware attack
Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...
Why Cloud Workload Security (CWS) Should Be Your 2022 Priority
The cloud is quickly becoming the most important battleground for organizations. ...