Magazine Button
 
 

Help AG partners with Okta to empower Middle East businesses

Help AG, a leading information security services, consultancy and solutions provider in the Middle East, has announced it has signed a reseller agreement with Okta, a leading independent provider of identity for the enterprise, for the region. The agreement strengthens Help AG’s cloud security portfolio by enabling the company to offer the Okta Identity Cloud to its enterprise customers. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly...

Read More

Veeam expert on keeping up with evolving cyberthreats

Kate Mollett, Regional Manager for Africa South at Veeam explores whether businesses are keeping pace with the speed of evolving threats, stating that even a humble phone charging cable can be used maliciously without a user consciously being aware of the risk posed. She also examines what needs to be done to ensure security remains integral to the organisation. It’s been a year since the private personal data of almost 60 million South...

Read More

Global survey shows consumers are abandoning brands after data breaches

Ping Identity, the leader in identity defined security, has released results of the Ping Identity 2018 Consumer Survey: Attitudes and Behavior in a Post-Breach Era, unveiling consumer sentiments and behaviours toward security and brands impacted by data breaches. Ping surveyed more than 3,000 people across the United States, United Kingdom, France and Germany to find out what they expect from brands when it comes to the safekeeping of personal information....

Read More
 

Latest Threats

EU cybersecurity organisations agree on 2019 roadmap

Four leading European cybersecurity organisations have agreed on a roadmap for 2019. On November 6, following a meeting at working level, the four principals of the Memorandum of Understanding (MoU) between Europol, the European Union Agency for Network and Information Security (ENISA), the European Defence Agency (EDA) and the Computer...

Read more

ESET researchers detect first UEFI rootkit in cyberattack

ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax by ESET, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets in central and Eastern Europe and is the first-ever publicly...

Read more

Industry experts comment on Facebook security breach

Industry experts have commented on a Facebook security breach which affected up to 50 million accounts. The social media giant wrote about the incident on its website, stating that attackers exploited a vulnerability in Facebook’s code that impacted ‘view as’ – a feature which enables people to see what their...

Read more

Latest Whitepapers

 

Events

  • Wed
    28
    Nov
    2018
    Thu
    29
    Nov
    2018

    MPOWER 2018

    Rome Marriott Park Hotel
  • Tue
    02
    Apr
    2019
    Thu
    04
    Apr
    2019

    GISEC 2019

    Dubai World Trade Centre, UAE
  • Tue
    04
    Jun
    2019
    Thu
    06
    Jun
    2019

    Infosecurity Europe 2019

    Olympia, London
 
 
kuwait

Get to know

 

Deep Dive

9th October 2018

Kaspersky Lab expert on de-risking Digital Transformation

Every business and organisation, whether small or large, is likely going through a Digital Transformation process. But this move to digitilisation does not come risk-free. Ilijana Vavan, Managing Director for...

8th October 2018

Securing credit card transactional data is crucial, says Xperien expert

Ever wondered where every credit card transaction is recorded and stored and how secure that data is, especially after the hardware on which that data is stored reaches end-of-life? If...

12th September 2018

Industry experts on how best to secure the endpoint

Endpoint security is a key consideration for all CISOs and security professionals facing the reality that cyberattacks are now considered inevitable. Industry experts discuss how they think CISOs should best...

8th August 2018

Protecting your data – fighting fire with fire with zero-day recovery

For any given organisation, data is the fuel that keeps your business going, without which you cannot operate. Protecting this data should therefore be the priority of any business. However,...

23rd July 2018

Prioritising investment: Best practice for CISOs on a budget

CISOs face the constant challenge of working to a budget against the backdrop of an ever-growing cyberthreat landscape. It can be difficult to know where to prioritise investment. Intelligent CISO...

16th July 2018

Cybersecurity is new source of ‘competitive advantage’ for retailers

Cybersecurity is a new source of competitive advantage for retailers. That’s according to a report by Capgemini's Digital Transformation Institute, which has called for more organisations to align cybersecurity policies with...

29th June 2018

Digital forensics – the tools you need to investigate a cyberbreach

Every organisation and enterprise around the world is now facing the very real possibility that they may become the victim of a data breach. Intelligent CISO hears from a number...

Browse our latest issue

Magazine Cover

View Magazine Archive