NEWS

The Red Cloak of security

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak , a fully-managed SaaS solution armed with revolutionary endpoint threat detection and monitoring capabilities. With lightweight sensors that can be provisioned in minutes for organizations to download to their endpoints, AETD Red Cloak can scale via a cloud delivery model to any size environment and slash the time required to detect and respond to cyber-attacks from months or weeks to hours or...

Read More

Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as a Service (IaaS) initiative. In addition, the SDP working group is hosting its fourth Hackathon throughout the RSA Conference, with a top prize of $10,000 available to the first participant to either access or disrupt a cloud-based mission critical application.

Read More




NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

RedLock Cloud 360 platform makes major advancement with holistic visibility intovpublic cloud...
CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials...
Toshiba to ‘bundle’ Becrypt Security with its mobile devices to target key markets...
Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das...
Yet only four out of 10 security leaders in the UK can answer the question, “How secure, or at...
Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more