FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

F5 offeriert Pay-per-Use-Zahlungsmodell und neue Lösungen für Amazon Web Services

Neue Angebote für AWS von F5: Option für flexible Zahlung nach genutzten Stunden; Orchestrierungs- und Verwaltungslösung; Testverfahren „Test Drive“ für strategische Anwendungstests – Demonstrationen stehen kostenfrei zur Verfügung

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More



HyTrust acquires HighCloud Security

Integrating administrative visibility and control with encryption and key management offers unprecedented security for cloud environments.

Read More

European Frozen food company turns to SOTI MobiControl to make the most secure and productive use...
Attackers using COVID-19 pandemic to launch attacks on vulnerable organisations.
First of its kind global report reveals hospitality, telecom industries are most vulnerable to...
Length of investigations, limited resources, and lack of context put security professionals at a...
A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber...
Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more