Magazine Button

More News

Dell EMC announces new Integrated Data Protection Appliance

Dell EMC announced its newest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing simple and powerful converged data protection to help mid-size organisations transform IT while combatting data sprawl and complexity. Comprehensive data protection has been a challenge for mid-size organisations.  Enterprise-class products come with higher cost and complexity, while lower cost […]


Fortinet gains traction in SD-WAN market with integrated offering

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced it has gained significant traction in the SD-WAN marketplace by delivering a comprehensive SD-WAN solution that provides both SD-WAN and security functionality in a single integrated offering for distributed enterprise branches. The growing appeal of SD-WAN technologies has caught the attention of the IT […]


Check Point research: Global impact of cryptominers doubles in H1 2018

Check Point has released its Cyber Attack Trends: 2018 Mid-Year Report, revealing that cybercriminals are aggressively targeting organisations using cryptomining malware to develop illegal revenue streams. Cloud infrastructures are also a growing target for threat actors according to the research. Between January and June 2018, the number of organisations impacted by cryptomining malware doubled to 42%, […]


F5 welcomes Mary Gardner as Chief Information Security Officer

F5 Networks has announced that Mary Gardner has joined the company’s leadership team as its Chief Information Security Officer (CISO). In this role, she is responsible for F5’s corporate-wide information security management efforts, along with strategic planning, governance and controls. This includes identifying, evaluating and reporting on F5’s overall security performance and posture in alignment […]


Why a unified approach to security is best – Fortinet expert

A new approach to network security is needed, according to John Maddison, Senior Vice President of Products and Solutions, Fortinet. Here, he argues that, in order to close the gaps inherent in isolated management strategies, a unified approach should be implemented. If your organisation is like most, you are in the middle of radically rethinking […]


Schneider Electric expert on why ‘security is everyone’s job’

As more companies embark on digital transformation strategies, every employee needs to have security at the forefront of their mind. Hervé Coureil, Chief Digital Officer, Schneider Electric offers three pieces of advice for organisations looking to strengthen their cybersecurity strategy. Security is everyone’s job now. These are wise words from Amazon’s CTO Dr Werner Vogels, […]


Proofpoint launches innovative new cloud defence solution

Proofpoint, a leading cybersecurity and compliance company, has announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and proactively protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss. Cybercriminals have pioneered a new way to compromise corporate email systems, this time by using brute force attacks to steal Microsoft […]


Industrial cybersecurity vendor closes US$18 million investment round

Radiflow, a leading provider of industrial cybersecurity solutions for critical infrastructure, has announced that the company has closed a US$18 million investment round. This investment round was led by ST Engineering Ventures, the corporate venture capital unit of ST Engineering. Radiflow’s existing investors, led by Zohar Zisapel, also participated in this investment round. Radiflow provides […]


Luminate Security announces Microsoft Azure integration

Luminate Security, provider of a universal platform for secure access to corporate applications in hybrid cloud environments, has announced that its agentless Secure Access Cloud platform is fully integrated with Microsoft Azure, providing direct, secure access to applications and services deployed on Azure. Luminate’s platform also integrates with Azure Active Directory for authentication and policy […]


How to navigate the intersection of DevOps and security

Meera Rao, Senior Principal Consultant at Synopsys, discusses how organisations and businesses can best approach DevSecOps. A brief history of Dev vs. Ops Traditionally, the software development process is split into two distinct phases. The development team writes and compiles code, then releases it to the IT operations team, which then ensures that the code […]


Browse our latest issue

Intelligent CISO

View Magazine Archive