BLOG

Deception for reducing risk and creating a defender’s advantage

  • Published in

Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn Crandall, Chief Deception Officer at Attivo Networks.

Read More

NEWS

Unprotected machine identities cost billions

  • Published in

Venafi sponsored report by AIR Worldwide reveals large companies will see the highest proportion of losses.

Read More

NEWS

Managing security data headaches

  • Published in

Sumo Logic’s Cloud SIEM Enterprise offering includes a rich set of capabilities to ease the burden on security operations center (SOC) personnel.

Read More

NEWS

Cyberattack fears are delaying business innovation

  • Published in

Research by HackerOne reveals how cyber fears are holding back IT projects, despite businesses feeling the pressure to innovate.

Read More

NEWS

ThreatConnect introduces Workflow

  • Published in

Latest version enables security teams to make faster and more informed decisions by providing a single Platform for threat intelligence analysis, incident response plans, and security processes.

Read More

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware...
Power and flexibility of Tanium’s platform, combined with OpenCTI's real-time Cyber Threat...
New global survey of 450 IT and security professionals reveals the full impact that the pandemic...
Sophos study of 10 cloud server honeypots placed worldwide reveals the need for visibility and...
Thycotic has released the findings from its 2019 RSA Conference survey. More than 200 security...
Netwrix survey reveals that 33% of financial organisations discovered sensitive data in insecure...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more