Magazine Button
 
 

Ring to promote innovative home security solutions at Intersec

Ring, a company on a mission to reduce crime in neighbourhoods, has announced its participation in Intersec 2019. Ring will use the Intersec platform to promote its innovative home security products and services, giving partners and neighbours the opportunity to experience Ring products first hand and to learn about its features and benefits via demos. Mohammad Meraj Hoda, Vice President of Business Development – Middle East and Africa at Ring,...

Read More

SUSE expert on what CISOs should be prioritising in 2019

Grant Bennett, Country Manager for SUSE South Africa and Sub-Saharan Africa, on what CISOs should be prioritising in 2019. Cybersecurity has proven to be a ‘problem child’ in 2018 and 2019 will be no different.  Given we are well entrenched in the technology era and businesses are revamping their business strategies to include a host of opportunities, the focus on security must be a key component of this –making the...

Read More

Check Point expert on 2019’s cybersecurity challenges

By Andy Wright, Regional Director, Northern Europe at Check Point “Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use introduces new vulnerabilities, giving cybercriminals opportunities for financial gain and politically-motivated...

Read More
 

Latest Threats

Industry experts comment on Collection #1 data breach

Industry experts have been providing comments on the Collection #1 data breach - the largest ever database of breached login details leaked on the Dark Web. Details of the breach were outlined by cybersecurity expert Troy Hunt, a Microsoft Regional Director, in his blog. Collection #1 is a set of email...

Read more

Bromium warns of malicious email attachments in run up to Christmas

Bromium, a pioneer and leader in application isolation and containment for endpoint protection that stops advanced malware attacks, has warned organisations of the threat posed by hackers delivering malware via email attachments in the run up to Christmas. This comes after Bromium recorded a spike in the number of malicious...

Read more

Check Point announces general availability of CloudGuard SaaS

Check Point has announced the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including...

Read more

Latest Whitepapers

 

Events

  • Tue
    02
    Apr
    2019
    Thu
    04
    Apr
    2019

    GISEC 2019

    Dubai World Trade Centre, UAE
  • Tue
    04
    Jun
    2019
    Thu
    06
    Jun
    2019

    Infosecurity Europe 2019

    Olympia, London
  • Sun
    06
    Oct
    2019
    Thu
    10
    Oct
    2019

    GITEX Technology Week

    Dubai World Trade Centre
 
 
kuwait

Get to know

 

Deep Dive

17th January 2019

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers –...

17th January 2019

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to...

15th January 2019

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies...

17th December 2018

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting...

10th December 2018

CyberArk expert – ‘Protecting CNI starts with securing social media’

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a...

6th December 2018

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they...

20th November 2018

Password protection: Tips on how to secure the ‘keys to the kingdom’

Research from LastPass by LogMeIn, a leader in password management, has revealed that while businesses are making strides in strengthening password security, there’s more work to be done – with...

Browse our latest issue

Magazine Cover

View Magazine Archive