Insights
- reports
2014 Global IT Risks Report | IT Security Threats and Data Breaches Perception versus Reality: Time to Recalibrate
The Global IT Risks Report collects insights from IT professionals around the world. The findings are analysed by Kaspersky Lab’s threat intelligence teams. This report focuses on the prevailing attitudes and strategies towards IT security and helps you understand the security threats you face.Read now - best practices guides
Best Practices - Controls
You can’t lock out the Internet and you can’t see everything that happens on your network in real time. But you can manage and control it.Read now - best practices guides
Best Practices - Systems Management
Enhance security and manage complexity using centralized IT management tools.Read now - reports
MEASURING FINANCIAL IMPACT OF IT SECURITY ON BUSINESSES
More than half of all businesses are increasing their cybersecurity budgets. But how much are they spending - and is it going to the right places? This report by Kaspersky and B2B International investigates.Read now - reports
Update for 2014 Information Security and Legal Compliance - Finding Common Ground in a Mobile Environment
A whitepaper exploring the common threads of information security laws and regulations; confidentiality, integrity and availability. Written by Michael R. Overly Esq., CISA, CISSP, CIPP, ISSMP, CRISC.Read now - reports
Virtualization Security: Understanding the Difference
A white paper exploring why a specialized security solution for virtual environments is essential.Read now - best practices guides
Best Practices - Mobile Security
Say 'yes' to mobile technologies, including BYOD, without opening new doors to security breaches.Read now - reports
Build your IT security business case
The challenge, the solution and how to get the business on board.Read now - best practices guides
Best Practices - Encryption
Proactive data protection is a global business imperative. Kaspersky Lab can help you implement many of the best practices around data encryption and protection.Read now - reports
Darkhotel APT: A story of unusual hospitality | whitepaper
An in-depth look at the Darkhotel threat actor. Operating for almost a decade and is currently active. Its offensive activity can be tied to specific hotels and business centres Wi‑Fi and physical connections, some of it is also tied to p2p/file sharing networks.Read now
- 1
- 2
1 /2