BLOG

Deception for reducing risk and creating a defender’s advantage

Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn Crandall, Chief Deception Officer at Attivo Networks.

Read More

BLOG

Why Insider Threats Are Harder to Detect in Cloud Environments

The adoption of cloud computing by businesses is progressing at an incredible rate. The cloud allows organizations to decrease their operating expenses by allowing them to outsource their infrastructure needs to cloud service providers (CSPs). The competitive market for CSPs has also driven them to develop optimized offerings for different use cases, allowing organizations to choose best-of-breed solutions for each of their business needs. By Patrick Vernon, technology writer.

Read More

BLOG

The rise of digital transformation at the edge

With or without realising, we’ve encountered the benefits of digital transformation in various parts of our lives – from everyday tasks such as shopping, working and socialising with friends and family, to how we stream films, and pay for things using our phone or watch. By Hubert Da Costa, VP and GM EMEA, Cybera.

Read More

BLOG

Introducing security to the DevOps cycle

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More

BLOG

Securing our infrastructure: 3 steps OEMs need to take in the IoT age

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn to the consumer space where most of us have experienced slow computers, ad pop-ups from malware and, in some cases, data loss when we’ve had to completely reformat our storage drives. By Vivek Shah, Senior Director of Product Management, Syncron.

Read More

BLOG

Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full visibility into their organisation’s sensitive data and where it resides, cyber attackers will take advantage. However, this is becoming increasingly difficult as enterprise data and applications move to the cloud and as Internet of Things (IoT) devices and other emerging technologies are introduced, all of which give adversaries an expanding attack surface to target. By Andrew Bushby, UK director at...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more