NEWS

The Red Cloak of security

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak , a fully-managed SaaS solution armed with revolutionary endpoint threat detection and monitoring capabilities. With lightweight sensors that can be provisioned in minutes for organizations to download to their endpoints, AETD Red Cloak can scale via a cloud delivery model to any size environment and slash the time required to detect and respond to cyber-attacks from months or weeks to hours or...

Read More

Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as a Service (IaaS) initiative. In addition, the SDP working group is hosting its fourth Hackathon throughout the RSA Conference, with a top prize of $10,000 available to the first participant to either access or disrupt a cloud-based mission critical application.

Read More




NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

HCL Technologies has opened its first European Cybersecurity Fusion Center (CSFC) in Gothenburg,...
Research reveals that companies investing in the latest cyber security products and services are...
More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are...
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Kaseya’s seventh benchmark survey finds cybersecurity and data protection continue to present the...
Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more