
What it takes to be a CISO: Success and leadership in corporate IT security
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
690 articles
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
How an analyst can build a threat intelligence workflow to run effective and complex investigations.
Our tools to secure, monitor, and manage customer infrastructure can be integrated with Autotask PSA.
The Microsoft Windows vulnerability CVE-2018-8453, which was used in several attacks this summer, was detected proactively.
Given the great need for it on the part of our corporate customers – true to the market principles of supply and demand – we decided to come up with a new service for the market – Kaspersky Managed Protection.
Case study: An analysis of insufficient safety practices at a small advertising agency.
Easy protection for complicated threats.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
Forgotten online resources can be used for extortion or phishing
How businesses globally handle personally identifiable information.
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
This new version of SynAck ransomware uses sophisticated evasion techniques.
Start protecting your network by stopping potential threats way before they can get too close — on the Internet gateway level.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
More than 400 manufacturing companies became phishing targets.
Fileless malware infects workstations and servers in corporate networks.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
Kaspersky Lab is contributing to project COMPACT to help local public administrations become more cyberresilient.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.