Thursday, 4th June 2020
BLOG

How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control systems and damaged nuclear power plants. Five years later, the BlackEnergy malware attack on the Ukrainian power supply became the first cyberattack that caused a blackout. By Anthony Perridge, VP Interna...

Read More

BLOG

Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys, joining forces will help them fight to win. Having access to the latest information from peers and subject matter experts will typically help all organisations, large or small, deal with any threat more effectively. Ultimately, the most effective deep defence against attack is collaboration, and it's at the heart of today's overall digital transformation. By Victor Acin, Threat Intelligence Analy...

Read More

BLOG

Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation. It’s not enough to be aware that an attack is taking (or has taken) place. There are four key questions organisations n...

Read More

BLOG

Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors. It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. By Gunter Reiss, VP Strategy, A10 Networks.

Read More

BLOG

Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of more than 100 million Capital One customers, in what was described by prosecutors as one of the biggest data thefts from a bank. It is potentially the most-feared scenario for many organisations: the hacker had gained access via a ‘misconfiguration’ of a firewall on a web application, allowing her to communicate with the server where Capital One stored its information. By Gordon Sockett, Content Pr...

Read More

BLOG

Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a discernible impact on the organisation’s stock valuation three years post-event. By Josh Lefkowitz, CEO of Flashpoint.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more