Transforming Security Through Zero Trust

You may have heard the phrase “zero trust” being thrown around quite a bit lately. While it may sound dystopian, zero trust is, I believe, a framework that embodies not only a concept but some of the cybersecurity best practices available today for en… Continue reading Transforming Security Through Zero Trust

Tufin Unifies Management of Cloud Cybersecurity Policies

Tufin today announced the availability of Tufin SecureCloud, which combines two existing offerings to manage cybersecurity policies for both monolithic applications and emerging microservices-based application environments. Company CTO Reuven Harrison… Continue reading Tufin Unifies Management of Cloud Cybersecurity Policies

Security Strategy: Moving Away From Tried and True

Many security professionals in developing their strategy still fall back on the old punch list approach to security configurations. They believe that if they check the box on tried and true methods such as password managers, creating strong device pas… Continue reading Security Strategy: Moving Away From Tried and True

Rapid Cloud Adoption Introduces Security Risks

Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that relies on … Continue reading Rapid Cloud Adoption Introduces Security Risks

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident that threatened much of Eur… Continue reading Cybersecurity: Chernobyl and its Cyber Lessons

Imperva Increases Self-Service Capability Fourfold with Custom Security Rules

Back in 2014, we introduced Rules (previously IncapRules) to give our customers advanced control over their application security. Today we’re putting even more of this custom tuning power in the hands of our customers by quadrupling the number of… Continue reading Imperva Increases Self-Service Capability Fourfold with Custom Security Rules

DarkVishnya: Banks attacked through direct connection to local network

In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network. Continue reading DarkVishnya: Banks attacked through direct connection to local network

Threat predictions for industrial security in 2019

It should therefore come as no surprise that our predictions from last year are still linked to currently unfolding trends. And while the fog has yet to clear, we decided to focus on the major problems that will affect the work of professionals involved into the industry, in 2019. Continue reading Threat predictions for industrial security in 2019

Threat Landscape for Industrial Automation Systems in H1 2018

In this report, Kaspersky Lab ICS CERT publishes the findings of its research on the threat landscape for industrial automation systems conducted during the first half of 2018. Continue reading Threat Landscape for Industrial Automation Systems in H1 2018