Magazine Button

Events

no event

Latest Whitepapers

Trend Micro joins forces with SCCC Alibaba Cloud to strengthen cybersecurity resilience...

Trend Micro, a global leader in cybersecurity solutions, has signed a Memorandum of Understanding (MoU) with Saudi Cloud Computing Company (SCCC) Alibaba Cloud, to protect the enterprises of Kingdom of Saudi Arabia from the evolving threat landscape and to promote the localisation of cybersecurity solutions in Saudi Arabia. During a special ceremony at the inauguration […]

PRODATA partners with Malwarebytes to effectively combat regional cyberthreats

Malwarebytes, a global leader in real-time cyber protection, has intensified its partnership with PRODATA, an established IT marketing and value-added distributor since 1992 across the African Continent and Europe, to bring industry-leading cloud-based security and cyber protection solutions to the African region. At a particularly crucial time for cybersecurity across Africa, PRODATA will become a […]

Cyberthreat landscape study 2023: Outpost24’s honeypot findings from over 42 m...

The Outpost24 research team have released the results of attack data gathered from a network of honeypots deployed to gather actionable threat intelligence. In total, 42 million attacks were registered between January 1 and September 30 2022, with 20 honeypots evenly distributed around the world. A detailed research report, uncovered the following key attack findings: […]

Cyberthreat landscape study 2023: Outpost24’s honeypot findings from over 42 m...

The Outpost24 research team have released the results of attack data gathered from a network of honeypots deployed to gather actionable threat intelligence. In total, 42 million attacks were registered between January 1 and September 30 2022, with 20 honeypots evenly distributed around the world. A detailed research report, uncovered the following key attack findings: […]

Cyberthreat landscape study 2023: Outpost24’s honeypot findings from over 42 m...

The Outpost24 research team have released the results of attack data gathered from a network of honeypots deployed to gather actionable threat intelligence. In total, 42 million attacks were registered between January 1 and September 30 2022, with 20 honeypots evenly distributed around the world. A detailed research report, uncovered the following key attack findings: […]

Go Phish: Bernard Brantley at Corelight

We ‘go phishing’ Bernard Brantley at Corelight, who tells us about life inside and outside the office. 1. What would you describe as your most memorable achievement in the cybersecurity industry?...

Go Phish: Paul Calatayud, Chief Information Security and Privacy Officer at Aqua...

We ‘go phishing’ with Paul Calatayud, Chief Information Security and Privacy Officer at Aqua Security, who tells us about life inside and outside the office. What would you describe as...

Deep Dive – Adam Philpott, Chief Revenue Officer at Trellix

https://intelligentbriefings.wistia.com/medias/1mxs4kcqvi?embedType=iframe&seo=false&videoFoam=true&videoWidth=640...

Go Phish: Jameeka Green Aaron, CISO of Auth0

We ‘go phishing’ with Jameeka Green Aaron, CISO of Auth0, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in...

Deep Dive – Spencer Lichtenstein, Product Strategist, RSA Security

In this edition of our Deep Dive series, Spencer Lichtenstein, Product Strategist at RSA Security, talks us through the steps organisations must take when launching a remote SOC. https://intelligentbriefings.wistia.com/medias/karf4qx9h2?embedType=async&seo=false&videoFoam=true&videoWidth=640...

Closing the skills gap: The art of finding and retaining cybersecurity talent

The cybersecurity skills gap is not going away any time soon. Tim Bandos, CISO at Digital Guardian, explains how companies shouldn’t always rely on the same channels to look for...

Take the pressure down! Four ways to lower the stress levels of your cybersecurity team

A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills...

Yahoo most impersonated brand in Q4 2022 phishing attacks

Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its Brand Phishing Report for Q4 2022. The report highlights the brands that were most frequently imitated by cybercriminals in...

Big drop in ransomware payments revealed but ‘highly concentrated’ core of attackers kee...

A new report reveals a dramatic drop in ransomware payments but warns a core group of attackers remains ‘highly concentrated’. The latest Crypto Crime Report by Chainalysis says that in 2022, total ransomware revenue fell to its lowest in three years. And while attackers still...

Royal Mail experiences cyber incident

The Royal Mail is experiencing severe service disruption to its international export services following a cyber incident.   The organisation released a statement about the issue: ‘We are temporarily unable to despatch export items including letters and parcels to overseas destinations....

Browse our latest issue

Intelligent CISO

View Magazine Archive