Deep Dive

How cyberattackers evade threat signatures – The case for...

Nimble attackers can easily create and hide their exploits in an infinite number of ways. Ammar Enaya, Regional Director – Middle East, Turkey and North Africa at Vectra, says: “The limitations of...

Don’t let the fear of hackers limit your cyber defence

Russell Coleman, Coordinated Disclosure Advisor at HackerOne, offers a deeper insight into ethical hacking and discusses the benefits such as its ability to offer organisations an additional layer of protection....

Britons embrace biometrics but over half will abandon applications if not...

Since the start of the COVID-19 outbreak, much focus and value has been put on contactless and online interactions – particularly in the financial sector. New research commissioned by global analytics software...

Mobile telecom industry making rapid progress towards 5G

A BPI Network survey found operators are rethinking security in light of 5G network traffic, a dramatic increase in connected devices and new mission-critical use cases. Mobile service providers say they are making...

McAfee uncovers attacks on corporate cloud accounts as companies work...

McAfee, a device-to-cloud cybersecurity company, has released a new research study titled Cloud Adoption and Risk Report – Work from Home Edition. McAfee’s new...

Cybersecurity reimagined for the CISO

Despite the technological innovation taking place, companies would do well to remain focused on ensuring their IT fundamentals are in place before rushing to capitalise on the latest trends. And nowhere is this more...

Browse our latest issue

Intelligent CISO

View Magazine Archive