NEWS

Cyber threats to increase in 2020?

FireEye has released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs and other senior executives across North America, Europe, and Asia to uncover attitudes towards some of cybersecurity’s most prevalent topics.

Read More


NEWS

IoT attacks - more planning required

Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks, despite the fact that ninety percent worry about future threats.

Read More


NEWS

Rapidly evolving world of cyber threats and defence explained

Atos highlights significant new threats and innovative cyber security solutions that have recently gathered momentum in its new paper Digital Vision for Cyber Security 2.

Read More

BLOG

How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control systems and damaged nuclear power plants. Five years later, the BlackEnergy malware attack on the Ukrainian power supply became the first cyberattack that caused a blackout. By Anthony Perridge, VP...

Read More

Postquantum cryptography and machine learning research initiatives currently underway in...
Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility...
Cyxtera Technologies has released findings from an extensive research project, the “Detection of...
The security software market is undergoing a dramatic transformation due to four key developments,...
Platform updates eliminate false-positive threats and automatically improves response management.
Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more