Magazine Button

Analysis

FireEye Cyber Defense Live spotlights security strategies

FireEye, Inc., the intelligence-led security company, has held its Cyber Defense Live event in Dubai, with the endorsement of the UAE Telecommunications Regulatory Authority (TRA). FireEye Cyber Defense Live in Dubai brought together global and regional FireEye executives as well as experts from the TRA, Etisalat Digital, other specialist companies, and customers to discuss best […]


Practical advice for securing IoT devices and protecting your network

The first high-profile DDoS attack using IoT devices that got the attention of the mainstream media happened around Christmas 2013 and was used to interrupt the launch of a prominent game. This attack came from the LizardStresser botnet, consisting primarily of webcams and CPE routers. In November 2016, the source code for the Mirai botnet […]


Digital Shadows’ CEO & Co-Founder: ‘When imitation is not the sincerest form of flattery’

The huge cost of cybercrime was once again graphically illustrated a few weeks ago by a story on the BBC of a hacker who allegedly used phishing techniques and fake websites to steal over $100m from two major US companies. According to the US Department of Justice, the Lithuanian man allegedly set up a bogus […]


Intel Security : New Global Cybersecurity Report

Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), has released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation […]


Attacker innovation and IoT exploitation fuel DDoS attacks

Arbor Networks, the security division of NETSCOUT, has released its 12th Annual Worldwide Infrastructure Security Report (WISR). The report covers a range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges Internet operators face daily from network-based threats and the strategies adopted to address and […]


Multi-layered security: Defending from all sides

The threat landscape in the Middle East is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defences. Instead of relying on a single attack vector, an advanced attack will use whatever unprotected paths exist, often combining paths in a blended method, to reach its target and accomplish its mission, […]


Browse our latest issue

Intelligent CISO

View Magazine Archive