Cybersecurity in financial institutions 2016 — and what 2017 holds
As our research shows, the actual costs of a cybersecurity incident to a financial institution can add up to as much as $926,000.
1278 articles
As our research shows, the actual costs of a cybersecurity incident to a financial institution can add up to as much as $926,000.
An example that demonstrates test results with a lot of room for error is a recent benchmark test, run by NSS Labs, of “advanced endpoint protection” products.
Predictions about trends and threats that will affect cybersecurity in the field of virtualization.
The never-ending cycle of Adaptive Security Architecture. Ideally, it enables us to stay ahead of cybercriminals, creating and improving security systems.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
The war with cyber-evil long ago turned into a war of algorithms. And effectiveness depends on the flexibility and reliability of the self-learning systems.
How the financial industry reacts to cyberthreats
Shamoon is back with a new version, and this time it is accompanied by another piece of similar malware with far more advanced evasive technologies
We take a multilayered approach in each aspect of all of our products.
True cybersecurity experts must be skilled at reverse engineering. Prior to SAS, Nico Brulez will hold a corresponding training session.
We believe our “True Cybersecurity” strategy complies with the demand and the future evolution of the market, thanks largely to our “HuMachine” approach.
To be successful, incident response has to be integrated with existing security solutions and should be powered by the threat detection solutions of the future.
New NSS Labs test utilized new methodology, however it’s results raised some serious questions
We shared our general vision of today’s threat landscape at Kaspersky Lab’s RSA booth.
Independent testers are constantly examining security solutions. We have some tips on how to make use of their results.
When an attack combines legitimate tools with fileless malware, it’s extremely difficult to detect, so antimalware teams constantly need to improve their skills
Healthcare technologies and mobile working practices are producing more data than ever before, so there are more opportunities for data to be lost or stolen.
We at Kaspersky Lab consider the Adaptive Security Architecture the most efficient model to build up cybersecurity practices for industrial objects
As you probably know, Star Wars: Rogue One has hit the theaters to tell the story of the Rebellion who steal the plans of Death Star and facilitate its destruction.
In our previous article on this topic, we looked into the history of memory-only attacks, also taking a glance at attack scenarios and appropriate defensive technologies. Now it is time