Magazine Button

More News

‘Company data on backup tapes poses bigger problems’: Xperien expert

Company data left on discarded backup tapes is potentially a bigger problem than data left on discarded hard drives. Many companies discard backup tapes before they start experiencing any problems and there is a vigorous market in used tapes and cartridges. However, Xperien CEO Wale Arewa warns that if the data on those backup tapes […]


A10 adds real-time security analytics to management platform

A10 Networks, a provider of intelligent and automated cybersecurity solutions, has announced a major upgrade to its ground-breaking multi-cloud analytics and management platform, the A10 Harmony Controller. The upgrade expands A10’s advanced security and connected intelligence capabilities via new modular Harmony Apps that support key A10 security solutions, Thunder SSLi (SSL Insight), Thunder CFW (Convergent Firewall), […]


Keysight to offer packet-level visibility into workloads in containers

Keysight, the test, measurement and visibility vendor, has extended the Ixia CloudLens visibility platform to offer packet-level visibility into workloads in containers and Kubernetes clusters. Containers are becoming more popular in cloud environments. Gartner reports that ‘container popularity will continually increase over the next 18 to 24 months’ and that by 2020, more than 50% […]


‘Prevention is better than a cure’ – Network security expert

Yoram Ehrlich, VP of Products, Niagara Networks, discusses why prevention is better than cure when it comes to network security.  An ounce of prevention Benjamin Franklin’s famous saying, ‘an ounce of prevention is worth a pound of cure’ is as good as it gets when considering network security. When facing intelligent, determined enemies, one must […]


ESET research: Is AI and ML hype putting businesses at greater risk?

New ESET research has revealed that the hype around the role of Artificial Intelligence and Machine Learning plays in cybersecurity could be putting businesses at greater risk. New research from global cybersecurity firm ESET reveals that the recent hype surrounding Artificial Intelligence (AI) and Machine Learning (ML) is deceiving three in four IT decision makers […]


Pulse Secure expert on the mutation of ransomware

Ransomware attacks have been responsible for bringing entire cities to a crippling halt this year and methods are constantly evolving. Scott Gordon, InfoSec Evangelist, Pulse Secure, discusses how enterprises and organisations can fortify their networks by implementing layered defences and applying secure access solutions.   In the last few months, mounting ransomware gangs have hit […]


Hot new IoT devices – a prime target for DDoS cyberattacks

There’s a flood of connected devices making their way into our homes and businesses. But these new IoT devices are becoming a prime target for DDoS attacks, says Ronald Sens, Director, EMEA Marketing at A10 Networks. There’s a flood of connected devices making their way into our homes and businesses. From mobile, wearables and car […]


Mobile banking trojan modifications reach all-time high

Mobile banking trojans hit the list of cyberheadaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal – peaked at more than 61,000. This represents a historic high; more than a three-fold growth when compared with Q1 2018 […]


Study reveals benefits of next-gen access solutions to organisations

Centrify, a leading provider of zero trust security through the power of next-gen access, has announced results of a commissioned study conducted by Forrester Consulting on behalf of Centrify, which finds that organisations powering zero trust security with next-gen access solutions reported twice the confidence to accelerate new business models and customer experiences. The study […]


‘Not all cloud software is created equal’ – Fortinet expert

Enterprises and organisations require scalable, high-performance security solutions to meet the growing demands of the modern marketplace. But they must make informed decisions when selecting a vendor, says John Maddison, Senior Vice President of Products and Solutions, Fortinet, to ensure the solution is the best fit for the organisation’s performance and budgetary requirements. An assumption […]


Browse our latest issue

Intelligent CISO

View Magazine Archive