Magazine Button

Deep dive

Prioritising investment: Best practice for CISOs on a budget

CISOs face the constant challenge of working to a budget against the backdrop of an ever-growing cyberthreat landscape. It can be difficult to know where to prioritise investment. Intelligent CISO hears from two industry experts about best practice for security teams – including those at SMEs – and examines a practical tool offered by one […]


Cybersecurity is new source of ‘competitive advantage’ for retailers

Cybersecurity is a new source of competitive advantage for retailers. That’s according to a report by Capgemini‘s Digital Transformation Institute, which has called for more organisations to align cybersecurity policies with customer expectations to take advantage of this opportunity. The report, Cybersecurity: The New Source of Competitive Advantage for Retailers demonstrates that consumers are increasingly aware […]


Digital forensics – the tools you need to investigate a cyberbreach

Every organisation and enterprise around the world is now facing the very real possibility that they may become the victim of a data breach. Intelligent CISO hears from a number of industry experts about why businesses need to consider integrating digital forensics into their security policies. How important is digital forensics to global organisations and […]


From SSL to CISSP – the certificates you need to be aware of

When it comes to cybersecurity there are two types of ‘certifications’ that really count. Here, we explore the realm of digital certificates as well as the security certifications available as professional qualifications. Search online for ‘security certifications’ and you’ll either be faced with a list of accredited training bodies, ideal for those looking to obtain […]


A10 Networks helps service providers secure mobile deployments

A10 Networks builds on its carrier-grade Gi/SGi firewall line-up to add broad-spectrum support for 3GPP standard protocols and application intelligence. A10 Networks, a Reliable Security Always company, has announced the enhancement of its Thunder Convergent Firewall (CFW) Gi/SGi firewall solution to help service providers support demands of existing mobile networks and the emergence of 5G […]


FireEye Cyber Defense Live spotlights security strategies

FireEye, Inc., the intelligence-led security company, has held its Cyber Defense Live event in Dubai, with the endorsement of the UAE Telecommunications Regulatory Authority (TRA). FireEye Cyber Defense Live in Dubai brought together global and regional FireEye executives as well as experts from the TRA, Etisalat Digital, other specialist companies, and customers to discuss best […]


Practical advice for securing IoT devices and protecting your network

The first high-profile DDoS attack using IoT devices that got the attention of the mainstream media happened around Christmas 2013 and was used to interrupt the launch of a prominent game. This attack came from the LizardStresser botnet, consisting primarily of webcams and CPE routers. In November 2016, the source code for the Mirai botnet […]


Digital Shadows’ CEO & Co-Founder: ‘When imitation is not the sincerest form of flattery’

The huge cost of cybercrime was once again graphically illustrated a few weeks ago by a story on the BBC of a hacker who allegedly used phishing techniques and fake websites to steal over $100m from two major US companies. According to the US Department of Justice, the Lithuanian man allegedly set up a bogus […]


Intel Security : New Global Cybersecurity Report

Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), has released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation […]


Attacker innovation and IoT exploitation fuel DDoS attacks

Arbor Networks, the security division of NETSCOUT, has released its 12th Annual Worldwide Infrastructure Security Report (WISR). The report covers a range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges Internet operators face daily from network-based threats and the strategies adopted to address and […]


Browse our latest issue

Intelligent CISO

View Magazine Archive