NEWS

Threat actors pivot toward more targeted attacks, evasive exploits

Malware, ransomware attack volume down 6% and 9%, due to more targeted attacks.

Read More

NEWS

Attack simulators dxw cyber rebrands to Tradecraft

dxw cyber, a London-based cyber security consultancy, announces it’s rebranding as Tradecraft. The new identity signals its mission to take a different approach to helping organisations become more secure.

Read More

NEWS

Lack of trust in zero trust?

2020 Zero Trust Progress Report lists at-risk devices among top secure access challenges – highlighting BYOD and IoT security trends.

Read More

NEWS

Shadow IT - a major concern

Infoblox has published new research that exposes the significant threat posed by shadow IoT devices on enterprise networks. The report, titled “What’s Lurking in the Shadows 2020” surveyed 2,650 IT professionals across the US, UK, Germany, Spain, the Netherlands and UAE to understand the state of shadow IoT in modern enterprises.

Read More

NEWS

Provable security

Traditional network and data security approaches have focused primarily on threat detection and vulnerability management. Demonstrating business value, such as compliance, risk management, or information security, has been challenging. Consequently, data security is more often looked upon as a necessary cost of doing business. However, as CIOs, CISOs and network security teams become more fully vested members of the C-suite, provable security remains an ever-growing and overarching goal when...

Read More

NEWS

Research into AI and security

Funding to develop Autonomous Industrial Cybersecurity Assistance System prototype granted by Innovation Authority in Israel and Federal Ministry of Education and Research in Germany.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
The proliferation of different devices, networks, platforms and applications to support the...
35% of IT professionals acknowledge that insider threat is biggest risk to networks.
According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam...
Healthcare group uses AI for 360-degree visibility to stop cyberattacks, ransomware and IoT...
Mobile app-based deployment option offers increased speed for authentication.
Menlo Security Isolation Platform (MSIP) has been selected by Fujitsu as a key component of its...