Secure Identity to Protect Your Reputation
Reputation is built on trust – yet the paradox in the age of access is that the only way we can build trust is...
Datentransparenz
Datentransparenz
Digital Guardian ermöglicht Ihnen, den Standort von vertraulichen Daten, den Datenfluss innerhalb des Unternehmens sowie Situationen zu ermitteln, in denen Daten einem...
Tackling Gootkit’s Traps
Gootkit malware uses misleading code to hinder manual research and automated analysis. - Read more
Centrify’s Next Strategic Step Forward with Thoma Bravo
I am pleased as CEO and co-founder of Centrify to announce that Centrify has entered into a definitive agreement whereby Thoma Bravo, a leading...
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework #outlook a{ padding:0;...
APT Trends Report Q2 2018
In the second quarter of 2017, Kaspersky Lab’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports,...
Cloud Security For The Healthcare Industry: A No-Brainer
The healthcare industry has become one of the likeliest to suffer cyber-attacks, and there’s little wonder why. Having the financial and personal information of scores...
To crypt, or to mine – that is the question
Way back in 2013 our malware analysts spotted the first malicious samples related to the Trojan-Ransom.Win32.Rakhni family. That was the starting point for this...
A Ticking Time Bomb: Understanding and Securing the Next Generation of Workers
It’s sometimes easy to forget that the younger employees of today are the managers of tomorrow. If we fail to understand how they use...
















