Applying Operational Excellence in MDR
This is the second in a three-part blog series from Bitdefender on how we have built ...
The Proactive Guide to Small Business Cybersecurity Strategy
Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...
What is an APT?
Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...
Applying Operational Excellence in MDR
Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...
Bitdefender Threat Debrief | December 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Bitdefender Issues Top 5 Cybersecurity Predictions for 2022
This year is coming to an end, and the cybersecurity community is working hard on ...
Supply Chain Security Threats - What SMBs Need to Know
Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...
The AV Comparatives Leaderboard Is Not As Crowded As It Seems
Three things matter the most when defending an organization against cyber threats: ...
What is Cyber Insurance? (and how do I know if i need it?)
Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...
Log4Shell – The call is coming from inside the house
On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...
What is SASE?
Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...
Tactical Threat Intelligence: How to shield data from advanced attacks
Struck by the reality of remote collaboration, companies had to rethink both their business ...