Bitdefender Threat Debrief | November 2022

Bitdefender Threat Debrief | November 2022

by Business Insights , on 30.11.2022

MDR Insights MITRE Engenuity ATTandCK® Evaluation for managed services MITRE, an internationally recognized organization known for the ATTandCK framework, released its first Engenuity ATTandCK® Evaluation for Managed Services results on November 9, 2022. The MITRE Evaluation tested several well-known MDR vendors, including Bitdefender. The evaluations serve as an impartial starting point to understand how managed security providers identify attacks, and what is delivered by the participants. read more

How to Get Corporate Alignment of Your Cybersecurity Strategy

How to Get Corporate Alignment of Your Cybersecurity Strategy

by Business Insights , on 28.11.2022

As a cybersecurity leader, it’s your responsibility to develop, establish, and implement a cybersecurity strategy, taking into account departmental budget, priorities, headcount, tools, security threats and risks, and the goals of the company as a whole. It’s a daunting task but a necessary one to ensure that your company is properly secured. read more

Why All Companies Should Invest in Layered Security

Why All Companies Should Invest in Layered Security

by Business Insights , on 21.11.2022

Security attacks can happen to your company in many different ways. In the past, cybersecurity was simpler and it was easier to prevent attacks. It was similar to protecting the front door of your home. With the right locks, you could prevent an intruder from getting in. read more

Bitdefender Again Leads the AV-Comparatives Advanced Threat Protection Tests

Bitdefender Again Leads the AV-Comparatives Advanced Threat Protection Tests

by Business Insights , on 17.11.2022

In November of 2022, AV-Comparatives concluded their 2022 Advanced Threat Protection Test for enterprise cybersecurity. The test simulates attack methods used by cybercriminals to gain control of an organization’s network. These advanced persistent threats (APTs) utilize fileless attacks that leverage popular scripting languages like JavaScript, PowerShell, Visual Basic, and more, to gain access to an organization’s internal computer systems. Fileless attacks are executed in memory by leveraging expected processes to avoid detection from traditional antivirus products. These types of tactics are common in data extortion attacks perpetrated by cybercriminal organizations and state-sponsored cyber-espionage operations. The tactics and techniques used in the test can be mapped to the MITRE ATTandCK framework. read more

How to Be a Cybersecurity Leader for the Whole Organization

How to Be a Cybersecurity Leader for the Whole Organization

by Business Insights , on 14.11.2022

The cybersecurity threats and risks currently facing organizations reach beyond the scope of the IT or cybersecurity department. Malicious attackers and risks threaten a company’s reputation, finances, business continuity, customer base, and compliance adherence just to name a few. A major risk factor here are employees, who, whether intentional or not, are often the vector through which compromises occur. read more

Analyzing the 2022 MITRE ATTandCK Evaluation for Managed Services

Analyzing the 2022 MITRE ATTandCK Evaluation for Managed Services

by Business Insights , on 09.11.2022

On November 9, the results of the first MITRE Engenuity ATTandCK® Evaluation for Managed Services were released. It evaluated the capabilities of 16 participating vendors in analyzing and detecting the behavior of an adversary run by the MITRE red-team. The test emulated activity based on the OilRig threat actor, and contextual output provided by the participants were mapped to the MITRE ATTandCK knowledge base. read more

Proactive vs. Reactive Security - How Threat Intelligence Can Help

Proactive vs. Reactive Security - How Threat Intelligence Can Help

by Business Insights , on 08.11.2022

Some bad things only need to happen once. As far as cybersecurity goes, one data breach is enough for online users to deem an organization unsafe. Still, many organizations seek comfort in the idea that, since something has not happened before, it likely never will – like a cybercriminal attack, a data leakage or a hack. What’s more, they seem certain that their employees and customers will simply avoid accessing dangerous links. This type of thinking makes most organizations perfect targets for cyberattacks. read more

Twitter Takeover Raises New Cybersecurity Concerns

Twitter Takeover Raises New Cybersecurity Concerns

by Business Insights , on 07.11.2022

While the relevance is debatable, news of Elon Musk’s Twitter takeover has been difficult to avoid. The platform’s new CEO has enacted a set of dramatic new changes primarily focused on monetizing the platform and generating revenue and profit. In just a few short weeks, a new subscription model has been released, half the workforce has been let go, and companies are rethinking their relationship with the platform. read more

How the Retail Industry Can Boost Their Cybersecurity With XDR and MDR Services

How the Retail Industry Can Boost Their Cybersecurity With XDR and MDR Services

by Business Insights , on 02.11.2022

The retail industry faces unique challenges when it comes to risk management and cybersecurity. Many retailers have both a physical and online presence, resulting in a complex environment they need to defend and secure. This hybrid model is also present in their third-party ecosystem — retailers often leverage physical and online third-parties to sell their products, exposing them to even more risk that hackers are very much aware of. read more

Next >>