Why Cybersecurity Departments Need a Vendor Management Policy
Organizations have more third-parties and vendors than ever before, so much so that it’s ...
Bitdefender Threat Debrief | October 2021
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator
The threat landscape is changing. Crimeware, a class of malware designed specifically to ...
What Is EDR and Why Is Endpoint Security So Important?
Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...
Enhancing Cyber Resilience through Extended Detection and Response (XDR)
Summary Advanced attacks represent a challenge for organizations that are getting breached ...
Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator
The threat of ransomware has grown dramatically in recent years. The recent emergence of ...
Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves
Building up a robust security department and having a strong security posture doesn’t happen ...
How Quantum Computing Will Impact Cybersecurity
The field of quantum computing is still in its early stages, but the technology will be ...
Pitfalls To Avoid With Your Security Awareness Training (SAT) Program
If you’re tasked with securing your organization, your employees are usually one of the ...
Top SMB Security Tips for Cybersecurity Awareness Month
October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...
Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter
These days, the line between our online and offline lives has become indistinguishable. Our ...
Why Healthcare IoT Requires Stronger Healthcare Cybersecurity
The healthcare industry has gone through a dramatic technological transformation, one that ...