A platinum award from our customers | Kaspersky official blog
How can you get an objective look at your customers’ opinion of your company? From October 1, 2016 to September 1, 2017, our customers posted 199 reviews of our products on the Gartner Peer Insights...
View ArticleIs blockchain compatible with privacy? | Kaspersky official blog
Coming up on the tenth anniversary of Satoshi Nakamoto’s paper, do we really need yet another take on Bitcoin? Well, I think so. Today, I am going to focus on an aspect of this technology that needs...
View ArticleWhy ICO security is a must | Kaspersky official blog
A rather naïve belief many blockchain enthusiasts share is that code backed by blockchain fabric is self-sufficient. “Code is Law,” as they say. Unfortunately, reality has already proved this maxim...
View ArticleStreamlining the KYC procedure with blockchain | Kaspersky official blog
Last year, I wrote a post about the possible privacy implications of applying blockchain technology to such areas as education, health care, and human resource management. However, a blockchain-based...
View ArticleThe future of cybersecurity | Kaspersky official blog
I’ve been in the cybersecurity industry for more than 15 years. During that time, and together with other infosec veterans, I experienced the rise of the FUD (fear, uncertainty, doubt) hype firsthand....
View ArticleKaspersky buys part of Nexway | Kaspersky official blog
This head-spinning year is finally drawing to a close. Sure, 2020 will be remembered for all sorts of unforeseen events and difficulties, but it’s presented some cool opportunities as well! As for us,...
View ArticleHow to fool Tesla and Mobileye autopilots | Kaspersky official blog
It’s a common movie plot device, the main character thinking they saw someone step onto the road, so they swerve and end up in a ditch. Now imagine it’s real — sort of — and instead of a trick of the...
View ArticleOntologies and their use in cybersecurity | Kaspersky official blog
Here at Kaspersky, we regularly analyze new technologies and look for ways to put them to use in cybersecurity. Ontology may not represent a very popular approach right now, but it can speed up and...
View Article