Internal threats now pose a major problem in terms of IT security. In order to protect corporate systems and data, it’s vital to understand what constitutes an internal threat. This section provides a brief introduction.
Insiders are an internal threat as they play a key role in data leaks. Learn more about the types of people who are involved in data leaks and their motivation, and how to mitigate the threat.
It’s essential to keep business-critical data secure. This section provides easy-to-follow recommendations which will help prevent data leaks and protect your business against insider threats.
Dec 12 2013
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage.
Dec 10 2013
In 2013 Kaspersky Lab products neutralized 5 188 740 554 cyber-attacks on user computers and mobile devices
Dec 05 2013
The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.
Nov 25 2013
The trusted environment concept combines the advantages of protection provided by Default Deny solutions and the flexibility of antivirus solutions.
Apr 11 2013
The favorite tool of the attackers has been malicious program we called "Winnti". It has evolved since the first use, but we divide all variants into two generations: 1.x and 2.x. Our publication describes 1.0 variant of this tool.
Aug 23 2010
The majority of the biggest malware incidents that took place in the second quarter of 2010 were linked in some way to botnets. New bots were created and existing bots further developed, such as TDSS, an article on which has been published by our virus analysts, and Zbot (ZeuS), which we discuss...
10 Mar, 20:31 GMT
04 Feb, 14:58 GMT
12 Dec, 08:17 GMT
05 Dec, 09:38 GMT
03 Dec, 10:02 GMT
16 Aug, 22:14 GMT
05 Aug, 19:58 GMT