A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet 59 percent say threat detection metrics are most critical.

Read More

Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle network attacks.

Read More

A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives threat analysts the power to gather, share and act on cyber threat intelligence.

Read More

More time online and increased volume of cyberattacks is not translating to safer password...
International survey of information security professionals identifies cloud, mobile devices and...
New report shows how hackers and criminals exploited COVID-19 pandemic in 2020 to target all...
Secureworks has released the findings of its State of Cybercrime Report 2018 to illuminate the...
WISR survey findings reinforce impact of global DDoS extortion attack campaign.
Overwork and burnout are very real issues for the IT security industry in 2020, according to the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more