Beyond Technical Offensive Security: 4 Tips for Implementing a Holistic Approach to Managing Cyber Risk

Cybersecurity assessments are an integral part of an organization’s security strategy, ...

Jul 30, 2024

IoT Security: A Call to Action for Improved Vulnerability Disclosure

The explosion of Internet of Things (IoT) devices over the last decade has connected us in ...

Jul 25, 2024

Rafel RAT: A Pest Invading Droid Systems

Mobile security is facing a major challenge in the form of Android malware. Picture a ...

Why Every Organization Should Implement Extended Detection and Response (XDR)

Extended Detection and Response (XDR) solutions have radically changed the cybersecurity ...

Our Software Release Strategy

Following recent cybersecurity events, we’ve seen a significant increase in inquiries from ...

Understanding APT40: Insights from CISA’s Latest Joint Security Advisory

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...

Breaking Down the Intersection of AI and Cybersecurity

In the world of cybersecurity, staying ahead of emerging threats is paramount. Florin ...

Introducing External Attack Surface Management (EASM): Continuous Visibility for Your External Assets

You might have unknown assets like remote users' computers, business partners, and cloud ...

What’s New in GravityZone Platform July 2024 (v 6.52)

This month, Bitdefender rolled out new functionality in Bitdefender GravityZone, a ...

Why MDRs Expanding Into Other Services Will Help Keep Companies More Secure

It seems like just yesterday that most organizations had never heard of Managed Detection ...

Jul 09, 2024

The Benefits and Limits of White Label Cybersecurity

If there’s one organizational challenge present across verticals in the security market, ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW