Cyber Risk Insights from the AIG 2017 Cyber Insurance Review

I read with interest AIG’s 2017 Cyber Insurance Review. In a one sentence summary: cyber insurance claims are up, due to systemic ransomware and...

The Gartner CISO Playbook: Leveraging Effective Control in the Cloud

For as long as we can remember, the concept of control has rested comfortably in physical location and ownership. It’s simple, if you could...

Centrify Named a Visionary in the 2018 Magic Quadrant for Access Management, Worldwide

Download the 2018 Gartner Magic Quadrant for Access Management Centrify has been named a Visionary by Gartner, Inc. in the 2018 Magic Quadrant for Access...

Modern OSs for embedded systems

At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering...

Log Management for Government Buyer’s Guide

Log Management for Government Buyer's Guide #outlook a{ padding:0; } body{ width:100%...

Olympic Destroyer is still alive

In March 2018 we published our research on Olympic Destroyer, an advanced threat actor that hit organizers, suppliers and partners of the Winter Olympic...

Identity-Based Security Comes of Age at Infosec18

The annual Infosecurity Europe (Infosec) show was back again at the start of June even bigger and better than before. This year it was...

Latest article

Great responsibility, without great power

Welcome to this week’s edition of the Threat Source newsletter. As I’m writing this, today (April 28) is International Superhero Day. If you don’t know the origin story behind...

Imperva Customers Protected Against CVE-2026-41940 in cPanel & WHM

What is CVE-2026-41940? CVE-2026-41940 is a critical authentication bypass vulnerability affecting cPanel & WHM, including DNSOnly, in versions after 11.40. The flaw, discovered by WatchTowr...

Microsoft Windows 11 April 2026 Security Update Breaks Third-Party Backup Applications

Microsoft’s April 2026 cumulative security update for Windows 11 is causing significant disruptions for users relying on third-party backup software, triggering an MS-DEFCON level...

Almost half of UK businesses hit by cyber attacks

The government's annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. - Read more