Magazine Button

Top Stories

Mimecast Report: 25% of ‘passed’ emails are unsafe

Top cloud email service providers leaving holes in security, driving need for third-party email security services Mimecast Limited, a leading email and data security company, has announced the results of its third quarterly Email Security Risk Assessment (ESRA). This measures the effectiveness of incumbent email security systems. This quarter’s assessment noted a continued challenge of […]


New McAfee report reveals how threat hunters are fighting cybercrime

McAfee, a cybersecurity company which operates in the Middle East, has announced the release of ‘Disrupting the Disruptors, Art or Science?’, a new report investigating the role of cyberthreat hunting and the evolution of the security operations centre (SOC). Looking at security teams through four levels of development—minimal, procedural, innovative and leading, the report finds […]


Cisco Report predicts new ‘Destruction of Service’ attacks

Key industries need to improve security posture as information technology and operational technology converge The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential ‘destruction of service’ (DeOS) attacks. These could eliminate backups and safety nets of organisations, required to restore systems and […]


Machine learning – taking your security team to the next level

By Raj Samani, Head of Strategic Intelligence, McAfee LLC Machine learning is all around us, enriching our online lives everyday. We see it with our own eyes when search engines accurately predict what we’re looking for after we type only a few letters. We feel it protecting our bank accounts, evaluating credit card transactions for […]


Average cost of a data breach in Middle East stands at $4.94 million

Malicious or criminal attacks are the most frequent cause of data breach in the Middle East IBM Security has announced the results of a Middle East study exploring the implications and effects of data breaches on businesses located in Saudi Arabia and the United Arab Emirates (UAE). Sponsored by IBM Security and conducted by Ponemon […]


Research shows more confidence dealing with hackers than data security

• 84% of IT professionals in the Middle East feel perimeter security is effective at keeping unauthorised users out of their networks • However, 66% are not extremely confident their data would be secure if perimeter defences were breached and 74% say unauthorised users can access their networks • Businesses in the region are confident […]


Comment: Cybersecurity starts with training your employees

By Mohammed Basheer, IT Security Practice Head, ISYX Technologies The Petya ransomware attack that hit computers around the world recently, the second in two months, is yet another reminder that computers play key roles in most enterprises, and that it does not take much to disable those computers. Irrespective of how robust your information security systems […]


Digital Shadows announces enhancement to its Dark Web security capabilities

Comprehensive enhancements of its award winning Searchlight service, highlights the breadth and depth of coverage organisations must consider in their digital risk management strategy across the open, deep and dark web Digital Shadows, an industry leader in digital risk management, has announced comprehensive enhancements of its award-winning SearchLight solution’s dark web coverage capabilities. It has […]


Cisco South Africa launches Cybersecurity Experience Centre and Academy

Globally, there were more than a million job openings in cybersecurity in 2016 and the demand for cybersecurity experts has grown three times faster than any other IT role. The shortage of cybersecurity professionals threatens both the private and public sectors in attempts to defend against the relentless evolution of cybercrime and shifting attack modes. […]


Death to passwords: identity management in the modern age

By Deepak Narain, Regional Presales Manager – MENA, VMware, one of the world’s leading enablers of digital transformation. Who are you? And can you prove it? These are the two questions your technology asks you every morning. And we now have a variety of ways to answer them: from typing complex, though hopefully memorable, passwords, […]


Browse our latest issue

Intelligent CISO

View Magazine Archive