Protecting health care
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
399 articles
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
What exactly was certified and how the certification was performed
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
Exploring front-running to capture the Gemini dollar’s antispam stake.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
One explanation of phishing success lies in a known psychological effect.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.