Bitdefender + Microsoft Virtual Network TAP: Deepening Visibility, Strengthening Security

In today’s rapidly evolving threat landscape, visibility is everything. The ability to ...

PHASR Launch: Major Bitdefender News at RSAC 2025

If you’re the kind of cybersecurity professional who is looking for a first-of-its-kind ...

GravityZone PHASR: Redefining Endpoint Security with Tailored Hardening for Every User

Cyberattacks have shifted away from using custom malware. Today, attackers use stolen ...

7 Types of Business Email Compromise Attacks Targeting Your Organization

Impersonation fraud attempts have been around for millennia. Think of a long-lost “cousin” ...

The Hidden Risks of Over-Relying on AI in Cybersecurity

Artificial intelligence (AI) and automation are game-changers in cybersecurity. AI-powered ...

Cybertrends to Track: Weaponizing People and Tools

Is it possible the next wave of cyber fraud targeting your organization could come from ...

Building a Threat Intelligence Team: Roles, Tools, and Strategic Value

Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an ...

Jan 21, 2025

How to Use NIST CSF 2.0 to Identify Security Gaps: Part 3

For those just tuning in, this five-part series is all about how to use a cybersecurity ...

Cybersecurity Predictions 2025: Hype vs. Reality

Cybersecurity predictions are abundant this time each year, many filled with sensationalism ...

Cloud Native Security: Balancing Consolidation and Flexibility

As organizations of all sizes continue to adopt cloud technologies, the importance of Cloud ...

Introducing YARA Rules to Enhance Threat-Hunting Capabilities

On the 27th of November Bitdefender announced General Availability (GA) for YARA rules ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW