What your business needs to know about GDPR
What is General Data Protection Regulation and what should you do about it
1055 articles
What is General Data Protection Regulation and what should you do about it
The finest minds of cybersecurity and business from Central Asia will engage in the battle to save the world on the 27th of April.
The threat landscape is always evolving. How can you protect your business?
Safeguarding data and combating cyberthreats in healthcare.
Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.
After more than a year of investigation, our experts have a thorough understanding of the Lazarus campaign and advice for protection.
A possible connection between Moonlight Maze, an APT that targeted the Pentagon and NASA in the late 1990s, and Turla, a modern day threat actor.
As our research shows, the actual costs of a cybersecurity incident to a financial institution can add up to as much as $926,000.
An example that demonstrates test results with a lot of room for error is a recent benchmark test, run by NSS Labs, of “advanced endpoint protection” products.
Predictions about trends and threats that will affect cybersecurity in the field of virtualization.
The never-ending cycle of Adaptive Security Architecture. Ideally, it enables us to stay ahead of cybercriminals, creating and improving security systems.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
The war with cyber-evil long ago turned into a war of algorithms. And effectiveness depends on the flexibility and reliability of the self-learning systems.
How the financial industry reacts to cyberthreats
Shamoon is back with a new version, and this time it is accompanied by another piece of similar malware with far more advanced evasive technologies
We take a multilayered approach in each aspect of all of our products.
True cybersecurity experts must be skilled at reverse engineering. Prior to SAS, Nico Brulez will hold a corresponding training session.
We believe our “True Cybersecurity” strategy complies with the demand and the future evolution of the market, thanks largely to our “HuMachine” approach.
To be successful, incident response has to be integrated with existing security solutions and should be powered by the threat detection solutions of the future.