Cloud vs. Fraud
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
1211 articles
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
The war with cyber-evil long ago turned into a war of algorithms. And effectiveness depends on the flexibility and reliability of the self-learning systems.
How the financial industry reacts to cyberthreats
Shamoon is back with a new version, and this time it is accompanied by another piece of similar malware with far more advanced evasive technologies
We take a multilayered approach in each aspect of all of our products.
True cybersecurity experts must be skilled at reverse engineering. Prior to SAS, Nico Brulez will hold a corresponding training session.
We believe our “True Cybersecurity” strategy complies with the demand and the future evolution of the market, thanks largely to our “HuMachine” approach.
To be successful, incident response has to be integrated with existing security solutions and should be powered by the threat detection solutions of the future.
New NSS Labs test utilized new methodology, however it’s results raised some serious questions
We shared our general vision of today’s threat landscape at Kaspersky Lab’s RSA booth.
Independent testers are constantly examining security solutions. We have some tips on how to make use of their results.
When an attack combines legitimate tools with fileless malware, it’s extremely difficult to detect, so antimalware teams constantly need to improve their skills
Healthcare technologies and mobile working practices are producing more data than ever before, so there are more opportunities for data to be lost or stolen.
We at Kaspersky Lab consider the Adaptive Security Architecture the most efficient model to build up cybersecurity practices for industrial objects
As you probably know, Star Wars: Rogue One has hit the theaters to tell the story of the Rebellion who steal the plans of Death Star and facilitate its destruction.
In our previous article on this topic, we looked into the history of memory-only attacks, also taking a glance at attack scenarios and appropriate defensive technologies. Now it is time
Digital healthcare allows ever more non-security trained medical staff to access and share confidential patient data, which builds up a challenge for IT security workers.
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
At VB2016, Juan Andrés Guerrero-Saade and Brian Bartholomew of GReAT discussed why APT attribution is not easy.
The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.
Kaspersky Lab is giving MSPs a chance to get in on the ground floor of an exciting new integration of security and remote monitoring and management tools.