Malware evolves to exploit cryptocurrencies

Fortinet has published the findings of its latest Global Threat Landscape Report. The research reveals cybercriminals are evolving their attack methods to increase their success rates and speed infections.

Read More

Barracuda introduces Cloud-delivered Web Application Firewall

New cloud-delivered web application firewall (WAF) from Barracuda protects websites and web applications against advanced layer 7 attacks,OWASP Top 10, bots, DDoS, and zero-day threats.

Read More


Airports are ill-equipped to deal with a major cyber attack

PA Consulting Group’s latest research found that airports are ill-equipped to deal with a major cyber attack. The report, ‘Overcome the Silent Threat’, says that the emergence of a hyper-connected model - where passengers in airports want fast internet and digital engagement with airlines and retailers – is increasing the opportunities for cyber criminals to exploit.

Read More

Kaspersky Lab moving core infrastructure from Russia to Switzerland

By the end of 2019, data from customers in Europe will be stored and processed in Zurich.

Read More

Personal usage encryption increasing dramatically

Sixty-four percent of security professionals say their personal encryption usage has increased due to recent geopolitical changes.

Read More

Delivers Zero Trust OT/IT security approach for office and production networks.
F5’s Infosecurity Europe 2015 survey reveals DDoS attacks are no longer a top security...
A third of IT security professionals do not keep corporate data in the cloud because of fear of...
Research shows 90 per cent of businesses had security breaches in the last year.
MobileIron Threat Defense includes multi-vector threat detection and remediation to protect iOS and...
State of Industrial Cybersecurity report reveals only 21% of organizations achieved full maturity...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more