Cybersecurity talent shortages: the roots and the solutions
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
52 articles
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Online dating is great for those looking for love – but beware the risks!
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Four major studies presented by our experts at the SAS 2023 international conference.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Are you sure your former colleagues don’t have access to corporate data or systems?
Research seeks to understand key drivers of the future of work.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
What the Hoax verdict means, and why such software is becoming more of a problem.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
In this podcast, we sit down with Kaspersky Lab Global Research and Analysis Team member Ido Naor to discuss his upcoming talk at Black Hat.
A webinar on potential damage and the main risks associated with cloud breaches.