Magazine Button

More News

Cybersecurity alert: should you fear the ‘Reaper’?

Article by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’, appears to be a more powerful strain of Internet of Things (IoT) attack malware than Mirai, the previous holder of the IoT botnet crown. And while Reaper hasn’t […]


Fujitsu safeguards organisations with Cyber Threat Intelligence service

Intended to safeguard companies from cyberattacks that could have a catastrophic effect on business continuity, Fujitsu has announced the availability of its Cyber Threat Intelligence (CTI) service in Europe, the Middle East, India and Africa (EMEIA). The service ensures that customers can properly defend themselves against cyberattacks, which have the potential to put a company […]


SophosLabs Malware Forecast: no platform immune from ransomware

Sophos, a global leader in network and endpoint security, has announced its SophosLabs 2018 Malware Forecast, a report that recaps ransomware and other cybersecurity trends based on data collected from Sophos customer computers worldwide during 1 April to 3 Oct, 2017. One key finding shows that while ransomware predominately attacked Windows systems in the last […]


New Nokia security software helps combat growing ransomware threat

Nokia has announced its next-generation NetGuard Security Management Center software, designed to bolster service providers’ ability to proactively detect, predict and combat the growing threat from ransomware and other types of malware. The volume, velocity and variety of security data today is overwhelming security teams. Companies typically receive hundreds of thousands of security alerts per […]


No platform immune from ransomware says SophosLabs 2018 Malware Forecast

Sophos, a global leader in network and endpoint security, have announced its SophosLabs 2018 Malware Forecast, a report that recaps ransomware and other cybersecurity trends based on data collected from Sophos customer computers worldwide during April 1 to Oct. 3, 2017. One key finding shows that while ransomware predominately attacked Windows systems in the last […]


Encryption: the beer goggles of business today

Encryption has become key to protecting the privacy of electronic communication – and for certain transactions, encryption is a legal requirement – but it’s a bit like beer goggles; it makes everything look a lot rosier than it is. With between 50% and 70% of online traffic now encrypted, it is safe to say that […]


Preparation is key when defending against DDoS attacks

Article by Bryan Hamman, Arbor Networks, Territory Manager for sub-Saharan Africa If you are well prepared with your security systems – deployed in a holistic manner – you can prevent generic threats from getting into your environment. With the right tools, processes and people, you can detect and contain more advanced threats before they have […]


Risk scenarios and keynotes at Amsterdam Security Convention

Scenario-based programming As a whole new approach, the program of the Amsterdam Security Convention is based on the captivating film scenario of a cyber attack that was enacted and filmed especially for the event. The film in 3 chapters relates the clever criminal attack on a distribution company that evolves into a bigger security incident, […]


Tech Data Europe announce agreement with Secret Double Octopus

Tech Data Corporation (Nasdaq: TECD) announced that Azlan, Tech Data Europe’s specialist brand for the value-added distribution of enterprise networking, server, storage and software solutions, today announced a pan-EMEA distribution agreement with Secret Double Octopus, a pioneer of keyless multi-shield authentication technology. Secret Double Octopus has developed a solution for the market that applies keyless […]


Commvault launches Endpoint Data Protection as a Service

–Fully managed by Commvault Software with 24/7 customer support, new SaaS solution provides flexible, easy-to-use solution for endpoint data protection —A zero infrastructure footprint solution, Commvault Endpoint Data Protection as a Service eliminates the need for infrastructure installation or IT management resources –Commvault Secure File Sharing and Commvault Endpoint Search round out new service offerings […]


Browse our latest issue

Intelligent CISO

View Magazine Archive