Posts by author
Panda Security
Daniel Lerch: “Steganography is a Tool of Great Interest to Cybercriminals”
We spoke with Daniel Lerch about the many steganography techniques that hackers and cybercriminals use to evade security systems.
Is the GDPR an Opportunity for Cybercriminals?
In this post, we analyze how cyber attackers could profit from the GDPR, the new EU data protection regulation that will enter into force in May 2018.
2018 Will Be the Year of Malwareless Attacks
In 2018, malwareless attacks will gain momentum and become a definitive trend to watch out for. Traditional security solutions will no longer cut it.
Compilation of PandaLabs Reports
The following is a compilation of all past PandaLabs reports. It is a complete record of the cybersecurity lab’s highlights.
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The Real-World Test is recognized by the industry for being the most complete and rigorous of the tests performed by AV-Comparatives.
What Will the CISO of the Future Look Like?
As the cyber landscape evolves, the role of the CISO (Chief Information Security Officer) is transforming. What does the CISO of the future look like?
3 Poor IT Practices that Endanger Companies
According to a recent study by Ponemon Institute, 28% of corporate security incidents is caused by poor IT practices within the company.