This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Ransomware: All Locked Up and No Place To Go

The following is external content provided as a free resource for blog readers.
But there is hope. By learning the tactics behind ransomware, you can stop an attack from happening in the first place. Download our eBook, Ransomware: All Locked Up and No Place to Go, to learn the key facts you need to know, such as:
  • How ransomware works
  • Whether or not you should pay the ransom
  • Tips for protecting your company from ransomware
You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Request Free!

Security in the Cloud

The following is external content provided as a free resource for blog readers.
Download Kaspersky Lab’s Security in the Cloud Snapshot to learn about the most pressing cloud security issues and how you can address them. We explore the growth of cloud in the marketplace, as well as how Kaspersky Endpoint Security Cloud overcomes the security challenges that small-and medium-sized businesses face when accessing the cloud.

Request Free!

Threat Landscape

The following is external content provided as a free resource for blog readers.
It is these kinds of facts and many others that make our practical guide, Navigating the Threat Landscape, a must-read.

Download the latest from Kaspersky Lab’s security experts, and you will find:
  • Insights into the current state of threats
  • Updates on common vulnerabilities and exploits
  • Advice on multi-layered security technologies
  • Tips to improve employee security awareness
Kaspersky Lab Global IT Risks Survey 2015

Request Free!

Lifting the Veil of Secrecy on Cybercriminals

The following is external content provided as a free resource for blog readers.
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world as:
  • The rate of profit to effort for cybercrime is 20-to-1.
  • Ransomware is so profitable that the total number of users attacked from 2014 to 2015 increased by 48.3%.
  • Cybercriminals are getting more efficient than ever and even hiring out their services in an effort to increase their ROI.
This is the same type of intelligence that Kaspersky Lab shares with INTERPOL, CERTs and police forces around the world. Now it’s yours for the taking.

Request Free!

What Is The Most Secure Mobile Operating System?

The following is external content provided as a free resource for blog readers.

We’ve already established that your smartphone needs good security software to battle an array of hacks and flaws, but which operating system is the best at holding its own against attacks?  Battling for the title of Most Secure Mobile OS, we have: Android, BlackBerry, Ubuntu, Windows Phone, and iOS. Time for them to duke it out!



Request Free!

Space Weather Outlook January 29, 2017 at 11:40PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-5 2017 January 29 at 9:25 p.m. MST (2017 January 30 0425 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 23-29 No space weather storms were observed. Outlook For January 30-February 5 G1 (Minor) geomagnetic storm levels are likely on 31 January and 01 February due to recurrent coronal hole high speed stream effects. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Debunking the Top 5 Security Implementation Myths

The following is external content provided as a free resource for blog readers.
Did you know it can be more complicated, costly and time consuming to stick with your existing, sub-par technology?

Download Debunking the Top 5 Security Implementation Myths to learn:
  • How a “rip-and-replace” can be planned and implemented without leaving your organization exposed
  • Why staying with your current, inferior technology costs your business more money in the long run
  • How automated functions and a single console can free up your IT staff to focus on mission-critical projects during the switch


Request Free!

Top 10 Tips for Educating Employees about Cybersecurity

The following is external content provided as a free resource for blog readers.
Download Kaspersky Lab's “Top 10 Tips for Educating Employees about Cybersecurity” to learn:
  • Why and how to develop an effective security policy
  • Examples of common threats to employees and your business
  • Tools to reduce risk and cybercrime


Request Free!

Future Risks: Be Prepared

The following is external content provided as a free resource for blog readers.
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn't enough.

Kaspersky Lab recommends focusing on prevention and mitigation of advanced threats. Our Global Research and Analysis Team (GReAT) wants to help with that effort.

Download Future Risks: Be Prepared - A Special Report on Mitigation Strategies for Advanced Threats to learn:
  • How the latest advanced threats target enterprise organizations
  • Why mitigation is so important
  • Key strategies to protect your business against known, unknown and advanced threats


Request Free!

Unlock the Key to Repel Ransomware

The following is external content provided as a free resource for blog readers.
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Unfortunately, this is not the script for a crime drama. Since many victims are willing to pay the ransom, this type of crypto malware, is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.

Download Kaspersky Lab's Unlock the Key to Repel Ransomware to learn:
  • Common ransomware scenarios and delivery mechanisms
  • Trends in this growing form of cybercrime
  • Recommendations to help your organization avoid victimization


Request Free!

Rethinking Security: Fighting Known, Unknown and Advanced Threats

The following is external content provided as a free resource for blog readers.
Cyberattacks can be the downfall of an organization's reputation. News headlines are filled with stories of major corporate data breaches across all industries. Hopefully, your organization has been spared this type of unwanted media attention.

Download Kaspersky Lab's latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about:
  • The evolution of cyberthreats that put your business at risk
  • How malware is often used as a door opener to launch more sophisticated, targeted attacks
  • The necessary features of a multi-layered security solution to defend your IT infrastructure today


Request Free!

The Threats From Within

The following is external content provided as a free resource for blog readers.
Human beings are the weakest link within any organization, presenting new opportunities for cybercriminals to infiltrate your company. But your employees can also be your first and best line of defense. With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.

Download Kaspersky Lab's Threats From Within to learn:
  • The role that employees play in keeping your organization safe
  • Common attack methods cybercriminals use and how to identify them
  • How to build an effective employee cybersecurity education program


Request Free!

Endpoint Security for Business: Technology in Action

The following is external content provided as a free resource for blog readers.
Are you settling for partial protection?

Download Kaspersky Lab's “Endpoint Security for Business: Technology in Action” to learn about:
  • Threats you can see and those you can't
  • The importance of proactive cyberintelligence
  • How Kaspersky Lab's Endpoint Security helps detect known, unknown and advanced threats


Request Free!

Asking the Right Questions

The following is external content provided as a free resource for blog readers.
At Kaspersky Lab, our research shows that more than 90% of businesses have experienced some sort of external security threat in the past year. With numbers like that, it's imperative that you know the answers to some very important questions, such as:
  • Where are our biggest vulnerabilities?
  • Are we focusing on the most dangerous threats that we face—the ones that can do the most damage?
  • Why is a multi-layered approach so important?
Find the answers you need to know by downloading our new eBook, asking the Right Questions: Today's Threat Landscape for the Enterprise. We'll break down the statistics on the biggest threats that enterprises face and how you can defend your business.

Request Free!

Box + Microsoft - Together We Mean Business

The following is external content provided as a free resource for blog readers.
These customers use integrations between Box and Office to collaborate on content from all of their devices. Watch this webinar to learn how you can use Box and Office 365 together and hear firsthand from a customer who uses Box and Office 365 together every day to successfully and securely manage their content.

Request Free!

Space Weather Outlook January 23, 2017 at 01:36AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-4 2017 January 22 at 11:24 p.m. MST (2017 January 23 0624 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 16-22 No space weather storms were observed. Outlook For January 23-29 There is a chance for G1 (Minor) geomagnetic storm conditions on 28 January due to recurrent coronal hole high speed stream effects. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

How to manage risk and ensure control -- what to look out for in robotic process implementation

The following is external content provided as a free resource for blog readers.

For many enterprises considering robotic process automation, concerns around security are preventing action. More often than not, it's the IT department that is slamming on the brakes, concerned about the potential scenario of dozens of robots running amok across its systems. What’s real and what’s not when it comes to RPA security concerns?



Request Free!

Cryptanium Overview White Paper: Building Security for a Safer Connected World

The following is external content provided as a free resource for blog readers.
This white paper describes Cryptanium, whiteCryption's leading software protection solution, and how it can be employed to build an effective shield around modern software applications. A number of use cases are also discussed. Download this white paper to learn:
  • The importance of software protection.
  • The various types of attacks.
  • Negative repercussions of such attacks and how Cryptanium can help secure your apps from threats.


Request Free!

The State of Mobile App Security Report

The following is external content provided as a free resource for blog readers.
This report covers the mobile market, the role security plays within the market, the cost of data breaches, different mobile operating systems and their vulnerabilities, a look at app security for the Internet of Things, what developers can do to secure apps, and how whiteCryption can help. Download this report to learn:
  • The role mobile security plays in the mobile market.
  • The Four Horsemen of mobile security.
  • Cost of data breaches.
  • Steps developers can take to thwart attacks on apps.


Request Free!

Infographic: Four Steps to Protect Your Code

The following is external content provided as a free resource for blog readers.
From enterprise applications to Internet-enabled cars and banking, apps are under attack, and only 54 percent of IT teams believe their apps can withstand threats. How do your apps rate? Download this infographic to learn:
  • Which mobile platforms are the most vulnerable to hacker threats.
  • Why you should worry about the 4.9 billion “things” that connected to the Internet this year—and the attacks your company will face.
  • What four steps your company can take to protect your apps from threats.


Request Free!

Space Weather Outlook January 15, 2017 at 10:55PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-3 2017 January 15 at 8:41 p.m. MST (2017 January 16 0341 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 9-15 No space weather storms were observed. Outlook For January 16-22 G1 (Minor) geomagnetic storm levels are likely on 18 and 19 January due to recurrent coronal hole high speed stream effects. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Netwrix Effective Permissions Reporting Tool

The following is external content provided as a free resource for blog readers.
Netwrix Effective Permissions Reporting Tool helps you make sure that employees’ permissions correspond to their roles in your organization by showing who has permissions to what in Active Directory and File Shares.

Request Free!

Netwrix Change Notifier for Active Directory

The following is external content provided as a free resource for blog readers.
Netwrix Change Notifier for Active Directory tracks changes to Active Directory (AD) users, group memberships, OUs, permissions, and provides visibility into what’s happening inside your AD.

Request Free!

The Missing Piece in the GDPR Puzzle

The following is external content provided as a free resource for blog readers.
It’s less than 18 months until the General Data Protection Regulation (GDPR) goes into effect. Are you ready? If you’re like most organizations, the answer is probably no.

But with 100% compliance required on May 25, 2018, and fines of up to 2-4% of global revenue for non-compliance, the pressure is on to comply. Download the Collibra eBook to learn:
  • What critical questions you need to answer under the GDPR
  • Why data governance is critical to ensuring GDPR compliance
  • How to implement a new approach to data protection and privacy
Time is running out. Read the Collibra eBook now.

Request Free!

Boost Customer Trust with Validation

The following is external content provided as a free resource for blog readers.
Today’s savvy online shoppers won’t buy from a site that doesn’t show the right signs of security. That’s why data safety, encryption and site validation are so important. In this white paper, you will learn why validation matters not only for overall site security, but also to your potential customers, and how choosing the right security measures can instill the trust necessary to turn a site visitor into a repeat customer.

Request Free!

All About SSL/TLS

The following is external content provided as a free resource for blog readers.
Today’s online consumers are more security-savvy than ever, and they won’t stay on a site they don’t trust. That’s why a high-assurance certificate from a reliable internet security provider is critical to your success as an online business—and that’s where Secure Socket Layer (SSL/TLS) certificates come in. According to the Symantec 2016 Internet Security Threat Report, SSL/TLS remains at the heart of online privacy, authentication and encryption. SSL/TLS certificates help websites create a secure line of communication across the internet so that every bit and byte of data is protected by a process that visitors can trust.

Request Free!

Build Customer Trust with Better Security

The following is external content provided as a free resource for blog readers.
Online security threats are a growing concern. Troubling security breaches seem to appear in the news on a regular basis. Meanwhile, there is no shortage of advertisements for products and services offering to protect consumers from online fraud and other scams. Consumers and business owners alike understand that threats to online security exist and require a proactive approach.

Request Free!

Stay Ahead of the Hackers

The following is external content provided as a free resource for blog readers.
Small and medium-sized organizations are increasingly becoming a key target for cybercriminals. In fact, three out of every five cyberattacks last year targeted small and medium-sized organizations. In a recent study conducted by the Ponemon Institute, 90 percent of respondents indicated that they have had two or more breaches in the past 12 months, and nearly two-thirds responded that they have had multiple breaches in that same time period. These breaches can be incredibly expensive with an average cost per incident of $7.7 million per year.

Request Free!

Top 5 SSL/TLS Attack Vectors

The following is external content provided as a free resource for blog readers.
Hackers are getting increasingly sophisticated with their threats, and smaller businesses are now being targeted more than ever. In fact, the last five years have shown a steady increase in attacks targeting businesses with less than 250 employees.1 When well-administered, SSL/TLS is an extremely effective data safety measure; however, it does require organizations pay attention to certain details and critical factors— or the hackers will find a way in.

Request Free!

Space Weather Outlook January 09, 2017 at 01:28AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-2 2017 January 8 at 11:09 p.m. MST (2017 January 9 0609 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 2-8 No space weather storms were observed. Outlook For January 9-15 No space weather storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Information Security Analysts

The following is external content provided as a free resource for blog readers.

Their responsibilities are continually expanding as the number of cyberattacks increases.

Considering a career as an information security analyst?

These professionals develop security measures to protect and maintain an organization’s computer networks and systems. This guide provides all the necessary information and resources to get started. Find out everything you need to know about this occupation, including qualifications, pay and standard duties. 



Request Free!

Crypto 101

The following is external content provided as a free resource for blog readers.

This is an introductory course on cryptography, freely available for programmers of all ages and skill levels. It comes with everything you need to understand complete systems such as SSL/TLS, block ciphers, stream ciphers, hash functions, message authentication codes, public key encryption, key agreement protocols, and signature algorithms.

 Crypto 101 is intended as an introduction to cryptography for programmers of any skill level. It starts with very simple primitives, and gradually introduces new ones, demonstrating why they are necessary. And eventually, all of this is put together into complete, practical cryptosystems, such as TLS, GPG and OTR.

If you are an everyday programmer who is also interested in how cryptosystems work, what are you waiting for?



Request Free!

Windows Malware Analysis Essentials ($30 Value) FREE For a Limited Time

The following is external content provided as a free resource for blog readers.

This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation.

What you will learn:

  • Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes.
  • Get introduced to static and dynamic analysis methodologies and build your own malware lab
  • Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief
  • Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program
  • Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario
  • Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode

Free offer expires 1/18/17



Request Free!

Space Weather Outlook January 01, 2017 at 11:27PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-1 2017 January 1 at 9:14 p.m. MST (2017 January 2 0414 UTC) **** SPACE WEATHER OUTLOOK **** Summary For December 26-January 1 G1 (Minor) Storm levels were observed on 26 Dec as coronal hole effects persisted. Outlook For January 2-8 G1 (Minor) conditions are expected on 05 Jan due to coronal hole effects. No other significant space weather is expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.