Magazine Button
 
 

Research reveals growing use of IoT devices in DDoS attacks

A10 Networks has announced the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally. The report describes the significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks. The A10 Networks report on the state of DDoS weapons...

Read More

Research reveals growing use of IoT devices in DDoS attacks

A10 Networks has announced the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally. The report describes the significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks. The A10 Networks report on the state of DDoS weapons...

Read More

The Ardagh Group uses Machine Learning solution for crucial visibility

The Ardagh Group, a worldwide leader in packaging solutions, utilised an AI-powered network detection and response platform from Vectra to provide crucial visibility into its global network. The Ardagh Group is a leading global supplier of metal and glass packaging solutions for many of the world’s leading brands. The company has a turnover of about US$8 billion, with around 120 plants in 40 countries and employs more than 23,000 people....

Read More
 

Latest Threats

ManageEngine adds user and entity behaviour analytics to SIEM solution

ManageEngine, the real-time IT management company, has announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment, threat corroboration, anomaly detection powered by Machine Learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and...

Read more

Bromium warns of malicious email attachments in run up to Christmas

Bromium, a pioneer and leader in application isolation and containment for endpoint protection that stops advanced malware attacks, has warned organisations of the threat posed by hackers delivering malware via email attachments in the run up to Christmas. This comes after Bromium recorded a spike in the number of malicious...

Read more

Check Point announces general availability of CloudGuard SaaS

Check Point has announced the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including...

Read more

Latest Whitepapers

 

Events

  • Tue
    02
    Apr
    2019
    Thu
    04
    Apr
    2019

    GISEC 2019

    Dubai World Trade Centre, UAE
  • Tue
    04
    Jun
    2019
    Thu
    06
    Jun
    2019

    Infosecurity Europe 2019

    Olympia, London
  • Sun
    06
    Oct
    2019
    Thu
    10
    Oct
    2019

    GITEX Technology Week

    Dubai World Trade Centre
 
 
kuwait

Get to know

 

Deep Dive

7th February 2019

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces...

17th January 2019

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers –...

17th January 2019

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to...

15th January 2019

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies...

17th December 2018

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting...

10th December 2018

CyberArk expert – ‘Protecting CNI starts with securing social media’

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a...

6th December 2018

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they...

Browse our latest issue

Magazine Cover

View Magazine Archive