NEWS

Cyber threats to increase in 2020?

FireEye has released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs and other senior executives across North America, Europe, and Asia to uncover attitudes towards some of cybersecurity’s most prevalent topics.

Read More


NEWS

IoT attacks - more planning required

Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks, despite the fact that ninety percent worry about future threats.

Read More


NEWS

Rapidly evolving world of cyber threats and defence explained

Atos highlights significant new threats and innovative cyber security solutions that have recently gathered momentum in its new paper Digital Vision for Cyber Security 2.

Read More

BLOG

How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control systems and damaged nuclear power plants. Five years later, the BlackEnergy malware attack on the Ukrainian power supply became the first cyberattack that caused a blackout. By Anthony Perridge, VP...

Read More

Veritas Technologies is warning knowledge workers to ‘think before they share’ sensitive data...
Latest research from Team Nautilus reveals majority of organizations fail to fix cloud...
International study shows no improvement in corporate defences despite soaring cyber losses.
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Elastic has launched what it says is the industry’s first free and open Limitless Extended...
ThreatQuotient has released the State of Cyber Security Automation Adoption in 2021, new research...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more