The principle of least privilege: what is it and why is it needed?
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
26 articles
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
What is Zero Trust, and why is it attractive for modern business?
iOS-based devices have a large share in the enterprise, which assures a strong demand for BYOD-oriented security features. A number of them arrive in iOS 8.
A visitor to Ferrari plant may find some of our rules too restrictive. Absolutely no cameras allowed inside, and we will need your signature to confirm that you were informed
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
The virtual environment requires the same protection as physical PCs, but the approach should be different. Full blown security solutions on every virtual machine? The strain for a physical server would be too great. But here comes ‘Light-Agent’…
This February, Kaspersky Lab held quite an important event: the annual Industry Analyst Summit. This was the third time we invited top security industry professionals to discuss a wide range
Mr. Vitaly Kamluk, Kaspersky Lab’s security researcher, enters the stage, goes over a certain number of slides, and then proceeds to do a live demo. He warns the audience about
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“, dedicated to the current cybersecurity situation and main trends in this field. As
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
The bill for your company’s Internet access just made you grunt in annoyance. And you know exactly who to thank for it. The offender has repeatedly been addressed, but either
Do companies need to take care of their personnel’s IT education today? This issue is controversial because on the one hand it is quite difficult to find people nowadays who
The question of ordinary users’ awareness of cyber threats and the scope of their knowledge about them may seem philosophical or rhetorical, but only at first glance. The results of
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
88% of tablet users and 96% of smartphone owners use personal devices to store important personal information. These figures are from the survey B2B International and Kaspersky Lab cooperatively conducted
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending