Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud workload security (CWS) by offering run-time support for containers and infrastructures with Linux kernel module (LKM) independence for the Bitdefender…

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin to trying to plug a hole in a boat after it’s started taking…

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, organizations face countless threats that exploit various aspects of their environment and business. Organizations need to know what kind of…

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part blog series from Bitdefender on how we have built principles of operational excellence (OE) into…

Bitdefender Threat Debrief | December 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. You can find all previous debriefs here.  Highlight of the month:…

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on technologies and solutions that will protect consumers and business users in 2022 and beyond. Bitdefender…

Supply Chain Security Threats – What SMBs Need to Know

Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that global enterprises operate. But many of them depend on suppliers and other business partners to stay…

The AV Comparatives Leaderboard Is Not As Crowded As It Seems

Three things matter the most when defending an organization against cyber threats: effectiveness, accuracy, and consistency. While effectiveness is well understood and refers to the overall ability of a security…

What is Cyber Insurance? (and how do I know if i need it?)

Part of the responsibility of being a leader in risk management or cybersecurity isn’t just to prevent an attack, it’s to minimize damage and mitigate the extent of an attack…

Log4Shell – The call is coming from inside the house

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability in Log4j logging library – assigned with a severity of 10 (the highest possible risk score). We previously documented…