NEWS

Enterprise IT leaders demanding more stringent cyber security from suppliers

  • Published in

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber credentials to win contracts.

Read More

NEWS

Legacy data systems present a red flag for GDPR compliance

  • Published in

Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer data, whilst over half said that assuring the location of test data would be a tough challenge.

Read More

Cybersecurity in 2017: What to expect for the rest of the year

  • Published in

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on staying safe online.

Read More

MapR and Talend collaborate

  • Published in

Combined offering accelerates GDPR compliance by addressing key requirements around data inventory, portability, anonymization, and more.

Read More

Going under cover to understand the hackers

  • Published in

Study reveals typical account takeover time, most sought after data, as well as lazy habits of attackers.

Read More

NEWS

McAfee report reveals secrets of successful threat hunters and SOCs

  • Published in

Effectiveness comes with complementary investments in human-machine teaming.

Read More

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...
Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...
With 2018 on the horizon, experts are readily analysing and making predictions about the types...
Survey reveals that hacking landscape will get much worse and IT security professionals cannot even...
Fourth annual report provides insights and trends drawn from analysis of more than 560 incidents.
Service prepares ecommerce businesses for new data security standards by enhancing protection for...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more