NovaStors Backup-Produkte schützen Windows Server 2012 und Exchange 2013

Während viele Anbieter sich mit der Unterstützung aktueller Technologien Zeit lassen, unterstützt NovaStor mit seinen Datensicherungen neue Produkte ab Verfügbarkeit.

Read More

Big Data mit großem Nutzen für IT-Sicherheit - Security-Intelligence-Plattformen geben Handlungsanweisungen sowie Übersicht zu gefährdeten Wirtschaftsgütern und entlasten das IT-Personal

Cybercrime wird immer mehr zum „Big Business“. Laut der Studie 2012 Cost of Cybercrime Study des Ponemon-Instituts stieg die Zahl der Angriffe auf US-Unternehmen um 42 Prozent gegenüber 2011 an. Dabei hatten es die Unternehmen mit durchschnittlich 102 erfolgreichen Angriffen pro Woche im Jahr 2012 zu tun. Studien wie von Verizon Business 2012 Data Breach Investigations Report weisen dabei auf eine immer zeitaufwendigere und komplexere Aufklärungsarbeit...

Read More


Cyber attacks and IP theft pose biggest threats

Juniper Networks has announced the U.K. findings of a Ponemon Institute report. Commissioned globally by Juniper Networks, the research highlighted that organisations surveyed in the U.K. are becoming increasingly concerned about the threat of intellectual property theft and confidential information being used to access business-critical systems. 61 per cent of U.K. respondents believe securing web traffic poses a significant threat to network security. Respondents are also seeing the greatest...

Read More

Qualys and FireMon enable real-time network risk visibility and remediation

Qualys, Inc. and FireMon have announced the integration of QualysGuard Vulnerability Management (VM) and FireMon Security Manager with Risk Analyzer in FireMon’s upcoming Version 7.0 release.

Read More

FireEye research reveals increasingly global nature of advanced cyber attacks

FireEye®, Inc. has announced the release of “The Advanced Cyber Attack Landscape” report and interactive maps that provide detailed insight into the global nature of malware communication activity related to sophisticated cyber attacks. The research highlights:

Read More

Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
New report details five ways hackers are exploiting organisations outside the firewall.
Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
AT&T SASE with Fortinet is said to be the first, global managed SASE solution at scale that unifies...
Netwrix survey reveals that 33% of financial organisations discovered sensitive data in insecure...
Business email compromise (BEC) and ransomware attacks prove most costly phishing threats to large...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more