Why organizations need to prepare themselves for BEC attacks

Organizations face a number of different attacks across a variety of vectors, which is often ...

The Threat Intelligence Requirement

The war against hackers and cybercriminals continues to intensify daily. As hackers become ...

Security Blueprint: How to Get Your Marketing & Goal Setting Right

A solid security blueprint helps you to provide the cybersecurity and threat protection ...

Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...

Applying Operational Excellence in MDR

This is the final installment in our three-part blog series on how Bitdefender has built ...

Applying Operational Excellence in MDR

This is the second in a three-part blog series from Bitdefender on how we have built ...

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Bitdefender Threat Debrief | December 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on ...

Supply Chain Security Threats - What SMBs Need to Know

Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW