All Research Sponsored By:Kaspersky

Common TTPs of the Modern Ransomware Groups
WEBCAST: Recent survey data shows that 66% of IT decision makers are highly concerned by potential ransomware attacks. In this webcast, 5 experts from Kaspersky sit down to discuss the state of ransomware, paying specific attention to the tactics, techniques, and procedures (TTPs) of ransomware syndicates. Watch now to learn more.
Posted: 10 Jan 2023 | Premiered: Jan 10, 2023

TOPICS:  .NET

What is Ransomware, How it Works and What You Can Do to Stay Protected
VIDEO: Ransomware is a serious threat that can affect you and all computer and mobile device users. But by knowing how to avoid it and by using up-to-date security software, you can stay safe. Watch this video to learn how ransomware works and what you can do to stay protected.
Posted: 13 Dec 2022 | Premiered: 13 Dec 2022

TOPICS:  .NET

No Stone Unturned
WHITE PAPER: Cryptors of all types present a major advance in the threat posed by cybercriminals. While stolen data is a serious problem, encrypted and inaccessible hostage data is even worse. Read on now to learn more about the danger of cryptors, as well as how Kaspersky Ransomware Protection can help you overcome them.
Posted: 30 Nov 2022 | Published: 30 Nov 2022

TOPICS:  .NET

Kaspersky Security Awareness
WHITE PAPER: The statistic should not surprise you. More than 80% of all cyber-incidents are caused by human error. Therefore, organizations need to focus on the concept of cybersafety. A culture rooted in cybersafe behaviors will reduce the number of incidents you must face. Read on to learn about a learning solution that helps you get there.
Posted: 27 Nov 2022 | Published: 23 Nov 2022

TOPICS:  .NET

Kaspersky Endpoint Detection and Response Optimum
VIDEO: The threat landscape is growing, with more sophisticated attacks being enacted than ever before. Kaspersky Endpoint Detection and Response Optimum aims to uncover the full scope of every attack. Watch now to learn more about Kaspersky Endpoint Detection and Response Optimum.
Posted: 23 Nov 2022 | Premiered: 23 Nov 2022

TOPICS:  .NET

Kaspersky Optimum Security
DATA SHEET: Businesses need to be able to defend themselves effectively against new, unknown, and evasive threats without overstretching budgets or employees. Advanced attacks are on the rise. 30% of successful cyberattacks now involve legitimate system tools. With this much confusion, you need a solution to help. Read on to learn more about it.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TOPICS:  .NET

Reduce The Risk Of Targeted Attacks And Advanced Threats
DATA SHEET: Threats are becoming more sophisticated, with hackers building attacks designed to circumvent specific security controls. The Kaspersky Anti Targeted Attack Platform aims to overcome these challenges by finding and preventing targeted attacks and hidden threats through a multi-layered threat detection. Read on to learn more.
Posted: 15 Nov 2022 | Published: 15 Nov 2022

TOPICS:  .NET

Straightforward Protection For Your Business – Wherever You’re Heading
PRODUCT OVERVIEW: With more cloud-based applications in play than ever before, IT teams are caught having to navigate and manage a vast array of new platforms, while at the same time accounting for the sea of new security concerns they have brought with them. Read on to learn how Kaspersky Endpoint Security Cloud aims to provide a single solution for IT security.
Posted: 10 Nov 2022 | Published: 10 Nov 2022

TOPICS:  .NET

Kaspersky Managed Detection And Response
PRODUCT OVERVIEW: With cyberattacks occurring at breakneck speeds, a reaction-driven security approach is no longer capable of preventing major security incidents. This paper looks at how Kaspersky’s Managed Detection and Response (MDR) offering is built to provide proactive awareness surrounding threats, in order to stop potential attacks. Read now to learn more.
Posted: 09 Nov 2022 | Published: 09 Nov 2022

TOPICS:  .NET

Reputation And Cybersecurity: From Risk To Opportunity, And Cyber-pride
WHITE PAPER: Organizations live through their relationship with customers, and when data breaches and cybersecurity incidents threaten customer’s trust, the damage is incalculable. Read this white paper for an in-depth look at how cybersecurity influences an organization’s reputation and learn strategies you can use to protect your organization’s reputation.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TOPICS:  .NET

SMB Cybersecurity: The Need for Better Protection
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020


Remote Work Cybersecurity: Best Practices & Trends
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020


Kaspersky Lab’s COVID-19 Relief Initiatives
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020


Advanced Attacks are Catching On - Here's What you can Do
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016


Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016


Cutting Complexity – Simplifying Security
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013


IT Security. Fighting the Silent Threat
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Webmail Forensics: Investigating Issues with Email Forwarding Security
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Kaspersky Endpoint Security 8 for Windows
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011


Overcoming virtualization security risks: Best practices
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Security For Virtualization: Finding the Right Balance
WHITE PAPER: While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
Posted: 20 Feb 2012 | Published: 20 Feb 2012


The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Take Back the Endpoint
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011


When Web 2.0 Becomes Security Risk 2.0
WHITE PAPER: Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
Posted: 19 Aug 2009 | Published: 19 Aug 2009


Drive-by Downloads--The Web Under Siege
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009