intrusion

Planning for Chaos

Planning for Chaos

The industry is shifting from focusing on cybersecurity as a technology problem, to cybersecurity as a business problem. Organizations must change their strategy and plan for chaos, instead of anticipating its arrival.

Features of secure OS realization

Features of secure OS realization

KasperskyOS aims to protect software and data systems from the consequences of the intrusion of malicious code, viruses and hacker attacks.

Breaking The Weakest Link Of The Strongest Chain

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server.

Security 101: Business Process Compromise

Security 101: Business Process Compromise

Business Process Compromise (BPC) is a type of attack where hackers infiltrate an enterprise and look for vulnerable practices, susceptible systems, or operational loopholes.

The Evolution of SIEM

The Evolution of SIEM

RSA NetWitness Logs and Packets is the only platform that can correlate security data across logs and packets. Know more.

3 Ways to Spot Phishing Emails

3 Ways to Spot Phishing Emails

New phishing scams plague businesses every single day. And spear-phishing campaigns are becoming increasingly sophisticated. Here’s a few tips you can use to help keep the phishers out of your business.

Load More