Magazine Button

Tenable to demonstrate the power of Predictive Prioritization at GISEC

Tenable, the cyberexposure company, has announced its participation at the Gulf Information Security Expo and Conference (GISEC), which will be held at the Dubai World Trade Center from April 1 to 3. Tenable will showcase its Cyber Exposure platform, including its recently announced Predictive Prioritization offering, to highlight new approaches to vulnerability management at the Middle East’s largest cybersecurity exhibition. Maher Jadallah, Regional Director - Middle East, Tenable, said: “Digital...

Read More

SearchInform 2019 road show a success in South Africa

SearchInform together with its South African partners CONDYN and Secnovate held its Insider Risk and Fraud Executive Briefing 2019 in South Africa, on April 9 in Johannesburg and on April 11 in Cape Town. The speakers introduced the original concept based on a holistic approach to human-related threats mitigation, including techniques for risk and compliance management, fraud prevention, employee monitoring, high-risk behaviour reporting as well as instruments to control activities...

Read More

Police Federation of England and Wales hit by cyberattack

The Police Federation of England and Wales (PFEW) has announced it has been hit by a cyberattack. In a statement, the PFEW said it was alerted to a malware attack by the security systems at its HQ on Saturday, March 9 and immediate steps were put in place to isolate this and reduce the risk of spread. All indications so far are that it did not spread to any branches...

Read More

Latest Threats

ManageEngine adds user and entity behaviour analytics to SIEM solution

ManageEngine, the real-time IT management company, has announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment, threat corroboration, anomaly detection powered by Machine Learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and...

Read more

Bromium warns of malicious email attachments in run up to Christmas

Bromium, a pioneer and leader in application isolation and containment for endpoint protection that stops advanced malware attacks, has warned organisations of the threat posed by hackers delivering malware via email attachments in the run up to Christmas. This comes after Bromium recorded a spike in the number of malicious...

Read more

Check Point announces general availability of CloudGuard SaaS

Check Point has announced the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including...

Read more

Latest Whitepapers



  • Tue

    Infosecurity Europe 2019

    Olympia, London
  • Sun

    GITEX Technology Week

    Dubai World Trade Centre

Get to know


Deep Dive

7th February 2019

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces...

17th January 2019

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers –...

17th January 2019

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to...

15th January 2019

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies...

17th December 2018

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting...

10th December 2018

CyberArk expert – ‘Protecting CNI starts with securing social media’

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a...

6th December 2018

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they...

Browse our latest issue

Magazine Cover

View Magazine Archive