Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.
Read MoreEvery person is unique and, just like their fingerprints, everyone’s digital life is different too. That’s why every Internet user needs a security solution that adapts to their online behavior – this was the rationale behind the release of Kaspersky Security Cloud. The new service combines comprehensive protection against cyberthreats (a must-have in today’s world) and a range of additional scenarios that come into play only when they are truly needed.
Read MoreNew DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt and distract network operators from more destructive security threats.
Read MoreDelivering visibility into hidden cyber attacker behaviours throughout virtualised environments.
Read MoreIndustry needs to accept that relying on patches and OS upgrades will not protect enterprises from today’s polymorphic threats, says Bromium.
Read MoreDeloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly detect, neutralise and recover from security threats.
Read More