BLOG

Meet The Three Amigos of Data: Governance, Privacy and Security

  • Published in

By Michael Queenan, co-founder and CEO of Nephos Technologies.

Read More

BLOG

7 steps to achieving cloud security success

  • Published in

By Jim Fulton, Senior Director of SASE and Zero Trust.

Read More

BLOG

Demystifying the security industry’s latest term: XDR

  • Published in

By Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity.

Read More

NEWS

89% of security leaders think traditional security approaches are failing in the face of modern threats

  • Published in

Research shows ‘game needs to be changed,’ with security innovation years behind that of the attackers, the board a decade behind security discussions and regulation needing more industry input.

Read More

NEWS

Lack of automated patch management a remote security risk

  • Published in

73% of organizations lack automated patch management, and 62% experienced incidents involving exploitation of a vulnerability for which a patch was available but had not yet been deployed.

Read More

NEWS

Dell Technologies and AWS collaborate

  • Published in

Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to help secure, isolate and recover data from a ransomware attack.

Read More

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.
Tripwire has publisjed the results of a study examining the security practices and concerns of...
Netwrix study dedicated to Sysadmin Day also finds that two thirds (66%) of system administrators...
Exabeam has released new research, revealing that 62 percent of blue teams have difficulty stopping...
IoTopia provides a blueprint for device makers to secure IoT devices and services across all...
WatchGuard report uncovers massive increases in endpoint attacks, rising encrypted malware rates,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more