Global attack intelligence integrated into local protection

Arbor Networks, Inc. has announced a new reputation-based threat feed as part of its ATLAS® Intelligence Feed (AIF) service. AIF is a research-driven feed of security policies designed to update Arbor’s Pravail products quickly and accurately by identifying threats based on real-world attack activity, reputation and behaviour.

Read More

Insider-Angriffe: Risiko steigt

Vormetric-Umfrage zeigt unzureichende Kontrolle privilegierter Benutzerkonten in deutschen Organisationen. 47 Prozent der befragten Firmen finden, Insider-Angriffe sind noch schwerer erkennbar als in 2012. Die effektivste Methode zur Sicherung der Daten ist die nach wie vor Verschlüsselung

Read More


NSA revelations impact on the Cloud

Report highlights nine major after-shocks compelling organisations to think again about how they use cloud computing.

Read More

Cyber attack ‘Hit List’ expands

Disruptive hacking tactics see financial services industry join government as most at risk for DDoS attacks.

Read More

Integrated retrospective packet forensics

Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic recording from a unified dashboard for performance assurance and detailed incident investigations.

Read More

33% said a malware attack cost on average between £10,000 and £50,000 to remediate,...
Corero Network Security has announced its integration with Verisign OpenHybrid and support for...
Findings from a report released by Central European University's Center for Media, Data and...
Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...
Nokia and Alcatel-Lucent intend to combine to create an innovation leader in next generation...
With 2018 on the horizon, experts are readily analysing and making predictions about the types...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more