What it takes to be a CISO: Success and leadership in corporate IT security
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
68 articles
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
Tips to protect your devices, your home network, and your privacy against cybercrime.
People worry about technologies stealing their jobs. Young people are less concerned; many of them are sure that completely new professions will emerge instead.
An expedition to the North Pole celebrates women’s rights and gender equality
Ransomware just took down an entire county in North Carolina. How did it happen, and what can your organization do to stay safe?
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
The Cybersecurity Summit is more than you might think: We talked space, blockchain, quantum computing, and more
The future doesn’t have to be a dystopian Internet of Things. We just have to prepare.
Let’s celebrate by sharing some advice with those who need it. Here are five tips you can use to help your friends and relatives stay safe online.
We love cybersecurity and find it fascinating. Cybercriminals invent new ways to attack victims daily, and we counter them with tools to protect people. It’s a game of cat-and-mouse, but
As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let’s see which of last year’s predictions came true and then try
Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce
Let’s start with where the word ‘captcha’ came from. It turns out that captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. The
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
Cybercriminals are starting to shift their focus from stealing personal data to other actions which bring immediate profit, experts at SANS institute say. At the recent ‘The Seven Most Dangerous
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
The SAS has come and gone. A lot of great knowledge was dropped during the conference including insights on Poseidon, Adwind and Metel. As we come back to reality, we
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100