Global attack intelligence integrated into local protection

Arbor Networks, Inc. has announced a new reputation-based threat feed as part of its ATLAS® Intelligence Feed (AIF) service. AIF is a research-driven feed of security policies designed to update Arbor’s Pravail products quickly and accurately by identifying threats based on real-world attack activity, reputation and behaviour.

Read More

Insider-Angriffe: Risiko steigt

Vormetric-Umfrage zeigt unzureichende Kontrolle privilegierter Benutzerkonten in deutschen Organisationen. 47 Prozent der befragten Firmen finden, Insider-Angriffe sind noch schwerer erkennbar als in 2012. Die effektivste Methode zur Sicherung der Daten ist die nach wie vor Verschlüsselung

Read More


NSA revelations impact on the Cloud

Report highlights nine major after-shocks compelling organisations to think again about how they use cloud computing.

Read More

Cyber attack ‘Hit List’ expands

Disruptive hacking tactics see financial services industry join government as most at risk for DDoS attacks.

Read More

Integrated retrospective packet forensics

Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic recording from a unified dashboard for performance assurance and detailed incident investigations.

Read More

New Reference Architecture provides validated blueprints for implementing comprehensive web...
HCL Technologies has opened its first European Cybersecurity Fusion Center (CSFC) in Gothenburg,...
Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by...
Nuix, a technology company that enables people to make fact-based decisions from unstructured data,...
McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new...
Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more