NEWS

Powerful backdoor capabilities now available in commoditized ‘off the shelf’ malware

  • Published in

New research underlines potential value of backdoored machines using SSH machine identities, aided by close collaboration between cybercrime and APT groups.

Read More

NEWS

Security - a balance between humans and automation

  • Published in

Security professionals anticipate automation will reduce IT security headcount, but not replace human expertise.

Read More

NEWS

Enhancing threat detection and incident response

  • Published in

Platform updates eliminate false-positive threats and automatically improves response management.

Read More

NEWS

Thales to provide partner Fujitsu with increased security capabilities

  • Published in

Fujitsu adopts Thales’s Cloud HSM and Key Management solutions to expand its managed PKI security and enterprise data encryption offerings.

Read More

NEWS

Automation augments human security

  • Published in

Security professionals anticipate automation will reduce IT security headcount, but not replace human expertise.

Read More

NEWS

Cybersecurity software revenue to reach $27 billion

  • Published in

The rising number of data breaches and cyberattacks globally, as well as the increasing awareness of the state-sponsored cyberattacks, have led to an increased demand for cybersecurity software solutions.

Read More

Two 4SECURail teams aim to design a Computer Security Incident Response Team (CSIRT) for joint...
Security operations teams face challenges in understanding how their security tools work leading to...
Since 2000, when the first camera phone was introduced, the number of mobile users has...
Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...
Despite eight out of ten IT decision makers experiencing a data or cyber security breach in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more