Operational Threat Intelligence – A Crucial Tool For Cyber Resilience
Cyber Security is paramount in modern business as attacks are constantly evolving and ...
Bitdefender and Amazon Web Services Strengthen Cloud Security
It’s no secret that cloud computing is growing rapidly. Over the past several years, ...
GravityZone and Nutanix AHV: Security Efficiency for Cloud Workloads
As enterprises shift towards a cloud-first digital environment, the need to address an ...
Combatting Ransomware as a Service (RaaS)
Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware ...
The Five Biggest Challenges in Healthcare Security Right Now
The healthcare industry is in the midst of tremendous change. And it comes from the pressure ...
Anti-Exploit Technology is Fundamental for Cloud Workload Security
All attacks include malicious activity, but not all attacks include writing malware to disk ...
Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection
Bitdefender contributes unique technology to the open-source community Hypervisor-based ...
Debunking The BlueKeep Exploit Hype – What You Should Know
WannaCry is still fresh in our memory, reminding organizations of how distractive an ...
Bitdefender 2018 Mid-year Cybersecurity Review
While we’ve just passed the halfway mark of 2018, data breaches and new threats have been ...
Security Must Adjust as SDN Goes Mainstream
After years of hype, 2018 may finally see the start of the mainstream adoption of ...
Coin Miner Reports Outrank Ransomware by Two Orders of Magnitude, According to Bitdefender Telemetry
Bitdefender telemetry revealed that from September 2017 until February 2018, ransomware ...
Alleged North Korean Threat Actor Targets Select Victims with another Critical Zero-Day Vulnerability Attack
Attributing cyberattacks and advanced malware to a particular country or entity is usually ...