NEWS

Bromium endpoint protection and threat intelligence sharing strengthen HP Device as a Service Proactive Security offering

Real-time threat isolation protects against malware introduced through email, browsers and files, providing enterprise-grade defense against threats.

Read More

NEWS

Identify3D deploys Gemalto solution

Digital manufacturing software provider expands its data security with SafeNet Data Protection on Demand cloud-based HSM service.

Read More

NEWS

Malicious intent outweighs technology as biggest threat to personal data

Apricorn, manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB storage devices, has published the results from its latest social media poll which found that sixty five percent of respondents believe that humans pose the biggest threat to their personal data.

Read More

NEWS

Phishing attacks with malicious URLs up 126 percent

Mimecast has published the latest Email Security Risk Assessment (ESRA) report, an aggregated analysis of tests that measure the efficacy of widely used email security systems. This quarter’s report found that email delivered with malicious URLs, a recently added part of the testing, has increased by more than 125 percent in comparison to last quarter’s results.

Read More


New Tessian report reveals how two million emails, flagged as malicious, bypassed traditional email...
Options, global provider of infrastructure as a service (IaaS) products to the financial services...
Security challenges can only be met with a steadfast commitment to improving cyber security...
Offering award-winning, top-of-the-line security protection to all consumer and business banking...
Research report outlines advanced attack scenarios and recommendations for OT operators.
Half of IT leaders say that future remote or hybrid work will make it harder to prevent phishing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more