Hackers only need 24 hours

  • Published in

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.

Read More

NEWS

Predicting people - the future of security

  • Published in

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More

Connected cars: who controls your car without you knowing?

  • Published in

Kaspersky Lab researchers have examined the security of applications for the remote control of cars from several well-known car manufacturers. As a result, the company’s experts have discovered that all of the applications contain a number of security issues that can potentially allow criminals to cause significant damage for connected car owners.

Read More

Tenable expands partner Ecosystem

  • Published in

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More

NEWS

IT departments find it hard to keep the Cloud safe

  • Published in

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More

RSA launches Risk & Cybersecurity Practice

  • Published in

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that helps operationalize Business-Driven Security™ architecture by helping to reduce business risk through systematic and continuous enablement for clients to manage identity, protect their assets, and detect, respond and recover from cyber attacks.

Read More

New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
New research underlines potential value of backdoored machines using SSH machine identities, aided...
Since 2000, when the first camera phone was introduced, the number of mobile users has...
Training remains a critical form of defence against cyber-attacks.
HP Energy Management Pack targeted at utility vertical leverages Platform to connect, analyze and...
Nearly three quarters (71%) of CIOs find new computing devices that they didn’t previously know...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more