NEWS

Attack on critical national infrastructure is imminent

  • Published in

Convergence between physical and cyber environments is leaving businesses exposed.

Read More

BLOG

IoT security: Keeping connected devices secure over time

  • Published in

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more than an afterthought, resulting in IoT products that at best, contain half-planned security measures and at worst, are a major liability to any network they connect to. By David Fearne, Global...

Read More

BLOG

When Mobile Security and Compliance Clash – The MDM crisis

  • Published in

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free Wi-Fi in order to steal data and credentials from off-site employees, creating phony apps for smartphones, and even physically stealing a device as a whole. By Anurag Kahol, CTO at Bitglass.

Read More

BLOG

CloudClient – Origins of a Zero Trust Network deployment for UK Government

  • Published in

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More

BLOG

Cyber security predictions for 2019

  • Published in

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just hasn’t been able to respond to the challenge fast enough, resulting in successful hacks that have resulted in data loss, and malicious cybersecurity...

Read More

VIDEO

Report: Securing the Cloud, Mobile and IoT

  • Published in

Threat actors are able to keep one step ahead by targeting the weakest points in an organization’s IT infrastructure – the cloud, mobile and IoT.

Read More

38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
Anti-virus software fails to protect against increasing attacks resulting in high downtime costs.
Respondents expect their transition to the cloud, as part of an organization’s digital...
EfficientIP’s 2018 DNS Threat Report reveals telecom organizations took average of 18 hours to...
Global research survey discovers that 65% of respondents experience buyers’ remorse after closing...
Dell Technologies Global Data Protection Index 2020 Snapshot shines light on key challenges...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more