Five steps to prevent IT security team burnout
A practical guide for chief information security officers and security operation center managers.
3313 articles
A practical guide for chief information security officers and security operation center managers.
This week on the Kaspersky podcast, Ahmed, David, and Jeff discuss the $450K cost of being Snoop Dogg’s virtual neighbor, disinformation on social networks, Omicron variant phishing, and more.
Kaspersky IoT Secure Gateway 100: How to protect industrial data whilst preserving business continuity.
Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up to you.
Two studies of the MSP and MSSP market development in the context of ubiquitous remote work.
This week on the Kaspersky podcast, Dave and Jag talk about facial recognition for goats, Tolkien crypto, and fines for default passwords.
How to set app permissions in iOS 15 for maximum privacy and security.
This week on the Kaspersky podcast, Ahmed, David and Jeff discuss Facebook’s haptic glove, Rent a Hitman, Tesla and more.
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
Emotet is back, some REvil arrests, and Twitter cryptovigilantes let loose — it’s all happening on this week’s Transatlantic Cable podcast.
We analyze some typical examples of phishing bait for movie streamers.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
Cybercriminals are targeting schools with ransomware attacks, so what does that mean for parents and students?
With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.
As teens spend an increasing amount of time on social media, it’s more important than ever to take care of their mental health.
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading.
Squid Games crypto scams, DarkSide ransom, and Facebook decides to shutter its facial recognition system.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.