Magazine Button

Blogs

‘Tis the season to do predictions: The 2018 cybersecurity landscape

Every year around this time all the security businesses and analysts leap for their crystal ball and attempt to predict what we should be worrying about in the coming 12 months or more. And the sad reality is that not a lot will change as there is not much need for the cybercriminal community to […]


Future-proofing organisations with zero-trust approach

Article by Mechelle Buys Du Plessis, Managing Director – UAE, Dimension Data 2018 will see a vast change in internal security procedures moving towards what is called a zero-trust security model. IT departments of organisations are spending millions of dollars while witnessing successful breach of their defences. Increasingly, the consensus appears to be that the […]


DDoS mitigation is the best practice in an IoT world

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this brand-new world of science fiction coming to life, threats lurk also. So says Arbor Network’s […]


The shift from prevention technology to deception and response

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new technologies such as IoT changing the threat landscape. Q: Since the product launch in June this year, has Attivo made any adaptations to […]


Cybersecurity alert: should you fear the ‘Reaper’?

Article by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’, appears to be a more powerful strain of Internet of Things (IoT) attack malware than Mirai, the previous holder of the IoT botnet crown. And while Reaper hasn’t […]


What you can learn from recent cyber attacks targeting school systems

Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognise. The cyber thug behind the message made a myriad of threats – including physical harm to district students and staff and releasing their personal information – unless a ransom was […]


The 5 most common router attacks on a network

Unfortunately, router attacks cannot be 100 percent prevented, but there are a few things that you can be doing to prevent one of the most common router attacks from occurring on your system and network. Large organisations are vulnerable to widespread attacks, with come being malicious and some carried out simply to prove a point. […]


Equifax breach: The impact for enterprises and consumers

Article by: Rick Holland, VP Strategy at Digital Shadows WHAT WE KNOW ABOUT THE EQUIFAX BREACH On September 7th, credit reporting agency Equifax announced “a cybersecurity incident potentially impacting approximately 143 million U.S. consumers.” To put this in context, at this time, this incident is almost seven times larger than the Office of Personnel Management […]


Preventing and mitigating ransomware with cyber situational awareness

Article by: Alastair Paterson, CEO and Co-Founder of Digital Shadows If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.” Even cyber extortion, which extends this criminal activity into […]


Fortinet offers cyber-safety tips amidst escalating cyber-attacks

Individual devices and user data becoming prime targets for cyber-criminals; 1 in 20 attacks target smart phones and tablets. Fortinet, the global leader in high-performance cyber security solutions, warns businesses and individuals to brace for escalating cyber-attacks as cyber-criminals expand their targets to home network devices and mobile devices. Fortinet’s latest Global Threat Landscape Report […]


Browse our latest issue

Intelligent CISO

View Magazine Archive