Magazine Button

Research

The CISO Challenge: Managing Threats with Limited Resources

Learn more about the key findings of Making Tough Choices: How CISOs Manage Escalating Threats and Limited Resources, a report conducted by Fortinet and Forbes Insights.#


Cyber adversaries up the ante on evasion and anti-analysis to avoid detection

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their […]


F5 Labs finds ‘formjacking’ soars as hackers hit consumers at checkout

Online forms such as login pages and shopping baskets are increasingly hijacked by cybercriminals hunting for personal financial information (PFI), according to new research from F5 Labs. F5 Labs’ Application Report 2019 examined 760 breach reports and discovered that formjacking, which siphons data from the customer’s web browser to an attacker-controlled location, remains one of […]


Research finds 91% reduction in dwell time for deception users

Attivo Networks, an award-winning leader in deception for cybersecurity threat detection, has announced the availability of a new research report, conducted by Enterprise Management Associates (EMA) and commissioned by Attivo Networks, that explores attitudes and views of deception technology in the enterprise. The research uncovered contrasts between users and non-users of deception technologies. One of the […]


edgescan research reveals time spent validating false positives

edgescan, a leading provider of fullstack vulnerability management, has discovered that more than 60% of security professionals estimate their security function spends over three hours per day validating false positives. The recent survey of IT security experts also revealed that nearly 30% of respondents are in fact spending more than six hours per day on […]


New Mimecast report reveals analysis of 67 billion rejected emails

Mimecast Limited, a leading email and data security company, has launched its first Threat Intelligence Report: Black Hat Edition 2019. The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers. Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active […]


Research reveals criminals’ most effective weapon in ransomware attacks

Vectra, a leader in network threat detection and response (NDR), has disclosed that cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in Infrastructure-as-a-Service (IaaS) cloud providers.  Attackers can easily evade network perimeter security and perform internal reconnaissance […]


Industry expert on building the foundations to support every cybersecurity strategy

The Minimum Cyber Security Standard defines the minimum security measures organisations and agencies must implement. But while awareness of this standard is high (98%), organisations have not seen the dip in cyberattacks that you would expect, as more had experienced over 1,000 attacks in 2018 than in 2017, according to the findings of an FOI […]


UK students at risk of email fraud ahead of A-level results day

Proofpoint, a leading cybersecurity and compliance company, has released research identifying that almost two thirds (65%) of the UK’s top 20 universities have no published DMARC (Domain-based Message Authentication, Reporting and Conformance) record, making them potentially more susceptible to cybercriminals spoofing their identity and increasing the risk of email fraud for students. With a record 40% […]


Securing DevOps: Why culture is key to driving company-wide success

Bharat Mistry, Principal Security Strategist at Trend Micro, explores the key challenges when it comes to implementing DevOps initiatives from a security standpoint. DevOps is the new engine for global business growth. All over the planet, organisations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet […]


Browse our latest issue

Intelligent CISO

View Magazine Archive