Magazine Button


Research reveals Australian and New Zealand cybersecurity strategies have complexity issues

Research released by Fastly, a global edge cloud platform, titled Fighting Fire With Fire, finds that over three-quarters (78%) of Australian and New Zealand organisations are increasing their cybersecurity spending to protect themselves against future risks with AU$95,000 spent annually just on web applications and API security control and tools. However, despite this increased budget with […]

Absolute Software enhances resilient Zero Trust capabilities

Absolute Software, a provider of self-healing intelligent security solutions, has enhanced its resilient Zero Trust product capabilities with public API expansion, Absolute Connector for ServiceNow and an expanded application resilience catalogue. The innovations are aimed at empowering users and customers with deeper visibility and intelligence, expanded software integrations and a refreshed user experience through updates […]

MP and PCC support the opening of cybersecurity defence hub

MP for The Cotswolds, Sir Geoffrey Clifton-Brown, and Police and Crime Commissioner, Chris Nelson, were both in attendance on November 17 for the opening of award-winning cybersecurity solutions specialist, Core to Cloud’s, newly refurbished headquarters, at the 11th-century castle in Cirencester. The refurbishment of the iconic, 11,000 sqft, 11th-century castle headquarters, has transformed the building […]

Safe online shopping best practices

Cybercrime is a rising threat for holiday shoppers. Aamir Lakhani, Cybersecurity Researcher for Fortinet’s FortiGuard Labs, discusses the causes of this and how shoppers and businesses can stay vigilant. The upcoming holiday shopping season is already expected to pose more challenges than the last. Shoppers are expected to descend upon e-commerce as many sought-after items […]

CA Southern Africa and Veracode reveal best practices for container security

As cybersecurity risks steadily increase, application security has become crucial. That means secure coding practices must be part of every developer’s skill set. Craig De Lucchi, Account Director at CA Southern Africa, explains how code is written and the steps taken to update and monitor it has a big impact on organisations and their applications. […]

Mayflex to distribute AVA Security, the cloud solution from Motorola Solutions

Mayflex, a distributor of converged IP solutions, has signed a distribution agreement with AVA to distribute its cloud-based security solution. The AVA brand is owned by the Motorola Solutions Company alongside Avigilon, Indigo Vision and Pelco which are also brands available to buy from Mayflex. AVA provides a scalable, intelligent, cloud-based security system that helps […]

Report identifies 600 mobile apps for banking, investing and cryptocurrency and examines the risk of Trojans targeting them 

Zimperium – a mobile security platform purpose-built for enterprise environments – has published new research detailing the increasing risk financial institutions and consumers worldwide face due to Trojan horse malware targeting mobile applications.   This new report titled, Mobile Banking Heists: The Global Economic Threat, examines more than 600 financial apps – which account for more than 1 […]

How to secure high-performance data

Ransomware and cyberattacks are taking place more and more frequently. High-performance environments are rich in high-value data, often containing personal, business, financial, IP, or even nationally significant data, meaning that they are at increased risk and must be protected. Yet, traditionally, data protection has not been top of mind for High-Performance Computing (HPC) users. Historically, […]

Research from OpenText reveals 85% of Singapore consumers have fresh concerns about how companies use their data

Research from OpenText reveals the growing level of concern among Singaporeans over the privacy and protection of personal data since the start of the pandemic. The survey findings demonstrate an overall lack of knowledge about what specific data is stored and for what reason, as well as a lack of trust in how organizations store […]

Lookout data shows credential theft mobile attacks on the rise in US Government agencies

Recent data commissioned by Lookout supports the fact that mobile phishing attacks are on the rise. We explore the findings in further detail, particularly focusing on the impact this is having on federal, state and local governments in the US. Steve Banda, Senior Manager, Security Solutions at Lookout, offers his expert opinion and advice on what CISOs […]

Browse our latest issue

Intelligent CISO

View Magazine Archive