Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.

Read More

NEWS

Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More

Connected cars: who controls your car without you knowing?

Kaspersky Lab researchers have examined the security of applications for the remote control of cars from several well-known car manufacturers. As a result, the company’s experts have discovered that all of the applications contain a number of security issues that can potentially allow criminals to cause significant damage for connected car owners.

Read More


Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More

Gemalto unveils robust encryption solutions

New SafeNet Luna HSM and 100 Gbps high-speed encryptors provide the industry’s fastest speeds and performance to encrypt data.

Read More

Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.
The ISMG Cybersecurity Complexity Study sponsored by ReliaQuest suggests enterprises are adopting ...
40.8% of internet traffic in 2020 was not human.
Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.
Fujitsu adopts Thales’s Cloud HSM and Key Management solutions to expand its managed PKI security...
The third quarter of 2015 has seen information and IT systems of different security agencies and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more