Bitdefender
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Cybersecurity threats and cybercrime trends of 2020
Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. “Our 2020 findings depict consumers under constant …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19122705/lock-silver-400x200.jpg)
How do I select a data encryption solution for my business?
It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …
Bitdefender launches cloud-based EDR solution for enterprises and MSPs
Bitdefender launched a new cloud-based dedicated Endpoint Detection and Response (EDR) solution designed to help enterprise customers and Managed Service Providers (MSPs) …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Cyberwarfare predicted to damage the economy in the coming year
71% of CISOs believe cyberwarfare is a threat to their organization, and yet 22% admit to not having a strategy in place to mitigate this risk. This is especially alarming …
Bitdefender Digital Identity Protection: Safeguarding a person’s online reputation
As the professional world moves increasingly online, Bitdefender announces the global launch of Bitdefender Digital Identity Protection, the service that lets freelancers, …
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …
![coronavirus](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11083105/coronavirus-blue-threats-400x200.jpg)
No, Corona Antivirus can’t fight COVID-19
COVID-19-themed scams are exploding both online and offline. Hijacked Twitter accounts peddling fake cures, scammy sites offering emergency supplies, misinformation campaigns, …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
2020 cybersecurity risks: Insecure security tools, supply chains, abandonware
Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, …
Bitdefender GravityZone enhanced with new endpoint defense capabilities
Bitdefender, a global cybersecurity leader protecting over 500 million systems across 150 countries, announced new endpoint defense capabilities for GravityZone, the …
![Insomnia](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093053/nosleep-400x200.jpg)
49% of infosec pros are awake at night worrying about their organization’s cybersecurity
Six in every ten businesses have experienced a breach in either in the last three years. At least a third of infosec professionals (36%) whose employers had not recently been …
![Intel CPU](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195036/intel-cpu-400x200.jpg)
SWAPGS Attack: A new Spectre haunts machines with Intel CPUs
Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
New infosec products of the week: July 26, 2019
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault Centrify’s Free Tier Vault is available immediately in the AWS Marketplace, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege