How to Use NIST CSF 2.0 to Identify Security Gaps (Part 5)

This is the fifth blog in a five-part series on utilizing a cybersecurity framework (NIST ...

Introducing GravityZone Compliance Manager

Regulatory compliance goes beyond legal obligations; it is a strategic approach to managing ...

GravityZone Compliance Manager: Simplify Compliance in a Complex Security Landscape

Staying compliant with regulatory mandates has become one of the most pressing challenges ...

How Analyzing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off ...

What’s New in GravityZone June 2025 (v 6.63)

Bitdefender rolled out new functionality during June 2025, in Bitdefender GravityZone, a ...

The ‘Why’ Behind GravityZone PHASR – A First of Its Kind

It’s been an incredible few weeks since Bitdefender announced the global launch of Gravity ...

May 08, 2025

How to Use NIST CSF 2.0 to Identify Security Gaps: Part 4

Welcome back to this five-part series on using a cybersecurity framework (NIST CSF 2.0) to ...

What’s New in GravityZone April 2025 (v 6.61)

Bitdefender recently rolled out new functionality in Bitdefender GravityZone, a ...

Bitdefender Achieves AV-Comparatives Anti-Tampering Certification

Bitdefender is one of just six vendors to pass the AV-Comparatives Anti-Tampering ...

Inside the Ransomware Supply Chain: The Role of Initial Access Brokers in Modern Attacks

Ransomware threat actors depend on numerous cybercriminal skillsets to breach, disrupt, and ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW