Can bigger security budgets save businesses from costly cloud breaches?
Credit to Author: Nikolay Pankov| Date: Fri, 15 Jun 2018 13:57:12 +0000
A webinar on potential damage and the main risks associated with cloud breaches.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 15 Jun 2018 13:57:12 +0000
A webinar on potential damage and the main risks associated with cloud breaches.
Read moreCredit to Author: Sergey Lurye| Date: Wed, 30 May 2018 15:37:23 +0000
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
Read moreCredit to Author: Julia Glazova| Date: Thu, 24 May 2018 11:00:15 +0000
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Read moreCredit to Author: Yaroslava Ryabova| Date: Thu, 05 Apr 2018 07:00:17 +0000
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Read moreCredit to Author: Anna Markovskaya| Date: Wed, 21 Feb 2018 14:00:53 +0000
We investigate how couples often neglect privacy — and the consequences.
Read moreCredit to Author: Kaspersky Team| Date: Wed, 31 Jan 2018 10:05:12 +0000
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Read moreCredit to Author: Windows Defender ATP| Date: Wed, 24 Jan 2018 14:00:21 +0000
Attackers are determined to circumvent security defenses using increasingly sophisticated techniques. Fileless malware boosts the stealth and effectiveness of an attack, and two of last years major ransomware outbreaks (Petya and WannaCry) used fileless techniques as part of their kill chains. The idea behind fileless malware is simple: If tools already exist on a device
Read moreCredit to Author: Jeffrey Esposito| Date: Thu, 18 Jan 2018 15:52:51 +0000
On this Kaspersky Lab podcast, Jeff talks with Sergey Golovanov about his SAS 2018 training on APT hunting.
Read more