1229 articles
We received the Platinum Award as part of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
As our latest ICS conference showed, the industrial cybersecurity market has reached maturity.
Most of those leaks could have been prevented with a timely audit of the IT infrastructure.
Think you can do better than a machine-learning algorithm and hunt down threats in the making? Take our quiz and find out!
In the modern threat landscape, passive security strategy should be reinforced with new methods, such as endpoint detection and response solutions.
Tools for giving a well-reasoned explanation of why security solutions are a must-have
Cybersecurity is ever-changing how can executives stay ahead of the curve?
Alex Moiseev addresses the issue of transformations that happen when a business starts working with enterprises.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Kaspersky Anti-Targeted Attack: 100% threats detected with 0 false positives in ICSA Labs certification test.
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
For the past 20 years, Kaspersky Lab has been saving the world. This e-book shares business best practices that the company has learned over the past two decades.
We hope that you find these five papers helpful in building out training for your staff
MSP: Trends, challenges and the keys to success in managed security in 2017
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.