Magazine Button

More News

Mimecast report: Cybercriminals switching to impersonation attacks

Mimecast Limited, a leading email and data security company, has announced the availability of its most recent Email Security Risk Assessment (ESRA) test results. The ESRA testing programme measures the effectiveness of existing email security systems in regular use by tens-of-thousands of organisations globally. The latest results highlight the continued challenge of securing organisations from […]


Sophos 2017 malware trends and predictions for the year ahead

Article by Harish Chib, Vice President, Sophos, Middle East & Africa From online gaming to mobile apps and wearable tech, technology is used at almost every touch point in people’s day-to-day lives. However, the downside of living in this hyper-connected society means that people are also extremely vulnerable to cyberattacks. This year’s Malware Report from […]


Cybercriminals bypass email security systems with impersonation attacks

Mimecast Limited, a leading email and data security company, has announced the availability of its most recent Email Security Risk Assessment (ESRA) test results. The ESRA testing programme measures the effectiveness of existing email security systems in regular use by tens-of-thousands of organisations globally. The latest results highlight the continued challenge of securing organisations from […]


Exchanging threat intelligence strengthens security posture

In a world of increasingly stealthy and sophisticated cybercriminals, it is difficult, costly and ineffective for companies to defend themselves against these threats alone. As revealed in The Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way, more companies are reaching out to their peers and other sources for […]


‘Tis the season for predictions: The 2018 cybersecurity landscape

By Alastair Paterson, CEO and Co-Founder, Digital Shadows Every year around this time all the security businesses and analysts leap for their crystal ball and attempt to predict what we should be worrying about in the coming 12 months or more. And the sad reality is that not a lot will change as there is […]


Middle East posts world’s highest increase in data breach costs

The Middle East is posting the world’s highest increase in data breach costs, with the average organisation risking nearly USD 5 million per data breach, showing the urgency in adopting data protection strategies, according to security experts. Worldwide organisations are facing increasing risk of material data breaches – when at least 1,000 customer or citizen […]


Future proofing organisations with zero-trust approach

2018 will see a vast change in internal security procedures moving towards what is called a zero-trust security model. IT departments of organisations are spending millions of dollars while witnessing successful breach of their defences. Increasingly, the consensus appears to be that the IT industry with its sets of sophisticated best practices, compliance and guidance […]


Dimension Data publishes its IT trends for 2018

Blockchain, together with artificial intelligence, machine learning, robotics, and virtual and augmented reality, have the potential to deliver disruptive outcomes and reshape digital business in 2018. And companies that have not started the digital investment cycle are at high risk of being disrupted. This is according to the list of top IT predictions for 2018 […]


Two-factor authentication should be a staple for security today

The tools for two-factor authentication have been available for about a decade and in an era of increasing cybercrime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to multi-factor authentication, an alarming number of companies rely exclusively on […]


KONGSBERG receives first DNV GL cybersecurity approval for system

As the shipping industry digitalises, vessels are becoming sophisticated hubs of connected systems and sensors that generate and exchange data both on board and back to shore. This connectivity increases the need for cybersecurity and for ways of verifying the cyber safety of installed systems. “At Kongsberg we have been delivering solutions for remote support […]


Browse our latest issue

Intelligent CISO

View Magazine Archive