Home » Lifestyle » Tech News
Industry 4.0: Advanced technologies key to unlock competitiveness in manufacturing

Industry 4.0: Advanced technologies key to unlock competitiveness in manufacturing

In the 21st century though, another option that has emerged is called leveraging growth. This happens when a company ties up with trusted third-party resources to create new value and mutual synergies. The goal is for companies to drive innovation, accelerate advancement and capture the maximum economic benefits.

Kaspersky Lab’s Threat Intelligence Bags Cybersecurity for IT Services Award

Kaspersky Lab today announces the latest accolade its Threat Intelligence Service has received from Singapore Business Review Technology Excellence Awards 2019.

Continue reading …
Kaspersky Lab: 31.8M Internet threats blocked in PH in 2018

Recent data from Kaspersky Lab show that close to 32 million internet-borne threats were detected and blocked by Kaspersky Lab among its users in the Philippines in 2018 setting out a growth of over 200 percent from 2017.

Continue reading …
Kaspersky Lab: A third of consumers would sell private data to a stranger

Many are instead choosing to sell-out when it comes to securing the integrity of their data and persona online – but with potentially big costs and consequences.

Continue reading …
Kaspersky Lab: Top TV show disguises used to spread malware

Cybercriminals are actively using new episodes of popular TV shows to distribute malware, research by Kaspersky Lab has found. Game of Thrones, The Walking Dead, and Arrow are the shows receiving the most attention from attackers. These and other findings are published in a new report, ‘Game of Threats: How cybercriminals use popular TV shows to spread malware.’

Continue reading …
New Kaspersky Endpoint Security provides better and automatic anomaly detection

Kaspersky Lab has unveiled the next generation of its endpoint protection with new Kaspersky Endpoint Security for Business. The product features Adaptive Anomaly Control, which intelligently perceives and blocks anomalous applications and user behavior, and offers improved protection from miners and network threats.

Continue reading …
Page 1 of 64123Next ›Last »