NEWS

The Red Cloak of security

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak , a fully-managed SaaS solution armed with revolutionary endpoint threat detection and monitoring capabilities. With lightweight sensors that can be provisioned in minutes for organizations to download to their endpoints, AETD Red Cloak can scale via a cloud delivery model to any size environment and slash the time required to detect and respond to cyber-attacks from months or weeks to hours or...

Read More

Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as a Service (IaaS) initiative. In addition, the SDP working group is hosting its fourth Hackathon throughout the RSA Conference, with a top prize of $10,000 available to the first participant to either access or disrupt a cloud-based mission critical application.

Read More




NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

PowerBroker Management Suite 4.0 adds greater depth to auditing, uncovers potential risks in...
According to a new CyberArk survey, half of organisations (50 percent) did not fully inform...
Intercity Technology study reveals that on average, IT users feel that IT departments are 21 months...
External cyber risks remain the biggest worry for European businesses.
Vodafone Business teams with Accenture to provide digital resiliency services to help businesses...
Report highlights opportunity for security leaders to rethink and transform cybersecurity...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more