Magazine Button

Top Stories

Macnica and Dragos to secure Japan’s critical infrastructure and manufacturing control systems with OT cybersecurity

Dragos, a global leader in cybersecurity for Operational Technology (OT), and Macnica Corporation have signed an agency agreement to provide Dragos’s OT cybersecurity solutions in Japan and have announced its availability. Challenges and background of OT security Cyber-risks are rapidly increasing in critical infrastructure and manufacturing, driven by the rise of threat groups targeting OT […]


National Cybersecurity Centre chief warns AI must improve cybersecurity

The CEO of the National Cybersecurity Centre has called for robust security systems in the early development of AI, amid concerns that proper security measures are being overlooked. As businesses race to develop new AI products, a former intelligence chief explained that malicious attacks could have a ‘devastating’ effect due to the rate AI is […]


Infoblox reveals shift in malware tactics after initial discovery

Infoblox discovers that open-source software Pupy is a smokescreen for the real capabilities of Decoy Dog – highlighting the critical need for DNS security. Infoblox has published a second threat report with critical updates on ‘Decoy Dog’, the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023. The malware uses DNS to […]


Cisco AppDynamics study: UAE organisations making application observability a strategic priority

New research published by Cisco AppDynamics highlights the challenges that IT teams are facing in managing application availability and performance within hybrid IT environments. In a newly released report, The Age of Application Observability, Cisco AppDynamics reveals the levels of complexity that technologists are encountering as they implement cloud-native technologies alongside existing on-premises applications and […]


Responding to new cyberattack reporting rules

The US Securities and Exchange Commission (SEC) has approved new rules that require publicly traded companies to publicise details of a cyberattack within four days of identifying a material impact on their finances, marking a major shift in how computer breaches are disclosed. Richard Suls, Security & Risk Management Consultant, WithSecure and Paul Brucciani, Cybersecurity […]


Women two-thirds more likely to fear losing CNI security jobs than men 

Gender diversity at risk with widening cyberskills gap, burnout and job attrition among women also posing threats to critical national infrastructure. UK critical national infrastructure (CNI) organisations are facing a dearth of diverse cybersecurity talent, with a disproportionate number of women afraid their jobs may be on the line when compared with men, according to […]


Enterprises to spend US$12.9 billion on private 5G network security by 2023

Trend Micro, a global cybersecurity leader, has announced new research revealing that most enterprises invest 5-10% of their IT budgets specifically on private 5G network security, despite an assumption that the technology is secure by default.  “When it comes to private 5G network technology, there’s no such thing as ‘secure by default’, so it’s reassuring […]


Researchers find satellite security lags decades behind the state of the art

Thousands of satellites are currently orbiting the Earth and there will be many more in the future. Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security of these systems from an IT perspective. They analysed three current low-earth orbit satellites and found that, from a […]


APAC energy, healthcare and transport sectors are most vulnerable to cyberattack

Report pinpoints proliferation of Generative AI circumventing approaches to authentication and verification of identity. Ensign InfoSecurity has released its latest Cyber Threat Landscape report showing the biggest threats and vulnerabilities across some of Asia’s key economies – including Singapore, Malaysia, Indonesia, South Korea and Hong Kong.   This year, the report incorporates a new approach […]


Estée Lauder experiences cybersecurity incident

The Estée Lauder Companies has identified a cybersecurity incident, which involves an unauthorised third party that has gained access to some of its systems. After becoming aware of the incident, the company proactively took down some of its systems and promptly began an investigation with the assistance of leading third-party cybersecurity experts. The company is […]


Browse our latest issue

Intelligent CISO

View Magazine Archive