Magazine Button

Top Stories

Kaspersky Lab discovers vulnerability in popular energy equipment

While performing a security assessment for one of its clients in the critical infrastructure sector, the Kaspersky Lab Security Services team discovered an important vulnerability. The CVE-2016-4785 vulnerability could allow an attacker to remotely obtain a limited amount of device memory content from relay protection equipment. The vulnerability was reported to Siemens, the equipment vendor, […]


Kaspersky Lab’s football tips for beating the hackers

The Euro 2016 football tournament, hosted by France, brings together 24 teams for 51 matches.  Millions of fans will be watching the games in stadiums and at public screenings.  Being a popular sport to watch in the Middle East, some employees have taken to working from mobile devices while watching a game with fellow supporters. […]


Mobile attacks on rise in Nigeria says Check Point Software

Quarterly analysis of the global Threat Index by Check Point Software Technologies reveals deep disparities in the threat environments in Africa, and the potential for increased attacks as cyber-criminals target mobile devices. Check Point is a global pure play network cybersecurity vendor, and its Threat Index provides a data based breakdown of new and prevalent […]


Results of the Infoblox Security Assessment report 1Q2016

Infoblox has announced results of the Infoblox Security Assessment Report for the first quarter of 2016, which finds that 83%—more than four out of five—of enterprise networks tested by Infoblox show evidence of malicious DNS activity. Infoblox offers free security assessments to customers and prospective customers, identifying DNS queries inside an organisation’s network that are […]


Report shows businesses fight ‘sudden death’ from DDoS attacks

A10 Networks has announced a new report with IDG Connect, “DDoS: A Clear and Ever Present Danger.” The report, which surveyed 120 IT decision makers at large organisations, finds businesses locked in combat with a growing army of online attackers. It finds that the average company suffers 15 DDoS attacks per year, with average attacks causing […]


The contours of a successful encryption strategy

Data is the new age currency and extremely valuable to organisations. However, there is somebody else who also has an eye on this data – the cybercriminal. While you leverage the potential of your organisational data to drive business growth, the cybercriminal sees your data as a money making opportunity. He wants to grab your […]


Symantec to acquire Blue Coat for approximately $4.65 billion

Symantec and Blue Coat, Inc. have announced that they have entered into a definitive agreement under which Symantec will acquire Blue Coat for approximately $4.65 billion in cash. The transaction has been approved by the Boards of Directors of both companies and is expected to close in the third calendar quarter of 2016. Greg Clark, Chief […]


Security vendor Tripwire announces tripling of EMEA sales in Q1 2016

Tripwire, a global vendor of endpoint detection and response, security, compliance and IT operations solutions, announced strong sales growth in Europe, Middle East and Africa. License sales more than tripled in the first quarter of 2016 as compared with the first quarter of 2015. This momentum was led by strong sales of Tripwire Enterprise, the […]


Fortinet announces its acquisition of AccelOps

Fortinet has announced its acquisition of AccelOps. The acquisition further extends Fortinet’s recently announced Security Fabric strategy by enhancing network security visibility, security data analytics and threat intelligence across multi-vendor solutions. “Sixty-percent of all security breaches result in stolen data starting within minutes of the breach and go undetected due to ineffective threat monitoring and […]


Enterprises should focus on securing perimeter, says Gemalto

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organisations continue to believe that basic perimeter security technologies are effective against data breaches. This is one of the many findings of the third-annual Data Security Confidence Index released by Gemalto. Of the 1,100 […]


Browse our latest issue

Intelligent CISO

View Magazine Archive