Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Tactical Threat Intelligence: What Is It and Practical Use Cases

As digital technologies continue to become central to every industry, they foster greater ...

Retail Cybersecurity: Common Threats During the Holiday Shopping Season

With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...

Cybersecurity in Banking: Bank hackers, ransomware, and more

The banking industry has famously been the target of many malicious hackers, leading to ...

How to Protect Distance Learning Against Cyber Threats

Terms such as distance learning, distance education, remote learning, cyber education, and ...

Healthcare Threat Hunting Must Get Proactive

There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...

Why Cybersecurity Departments Need a Vendor Management Policy

Organizations have more third-parties and vendors than ever before, so much so that it’s ...

The Five Biggest Challenges in Healthcare Security Right Now

The healthcare industry is in the midst of tremendous change. And it comes from the pressure ...

Bitdefender Takeaways from Black Hat 2021

Black Hat has grown to be one of the cybersecurity industry’s most well attended and ...

Deep Dive Into A FIN8 Attack – A forensic investigation

During a recent investigation, our researchers encountered a new version of the BADHATCH ...

Effective Healthcare Security Is Much More Than Compliance

When it comes to managing the security of their data and business-technology systems, many ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW