Magazine Button

Enterprise Security

More than 40% of ICS computers attacked during first half of 2018

Research shows that African countries were worse off when it comes to ICS computers that were attacked. More than 40% of all industrial control system (ICS) computers protected by Kaspersky Lab solutions were attacked by malicious software at least once during the first half of 2018. The most impacted countries were Vietnam, Algeria and Sri […]


IDnow launches AI-powered ID Verification-as-a-Service platform

IDnow, nominated for the 2018 FinTech50 list of hottest European start-ups, has launched the next-generation of its identity Verification-as-a-Service platform that will enable companies to verify the identities of more than 7 billion potential customers online, easily and securely, in compliance with regulatory Know Your Customer (KYC) requirements across Europe and beyond. The IDnow platform, […]


Fortinet introduces network access control solution for IoT security

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced FortiNAC, a new network access control product line that delivers network segmentation and automated responses for IoT security. The massive rise of unsecure, headless IoT devices, including industrial and medical IoT, requires new tools for securing networks. Fortinet’s new FortiNAC product line […]


Prevent your network from being attacked by a Botnet

Not having enough network protection may allow your organisation’s devices to be part of the next cyberattack, according to Harish Chib, Vice President, Middle East and Africa, Sophos. Botnets are large volumes of distributed networked computers and devices that have been taken over by a cybercriminal. Botnets, also referred to as bots, are usually taken […]


Trend Micro releases findings of survey on IoT deployment decisions

Trend Micro, a global leader in cybersecurity solutions, has revealed that organisations around the world are exposing themselves to unnecessary cyber-risk by failing to give IT security teams a voice when planning Internet of Things (IoT) project deployments in enterprise environments. A survey of 1,150 IT and security decision makers in Germany, France, Japan, the […]


Proofpoint launches closed-loop email analysis and response solution

Proofpoint, a leading cybersecurity and compliance company, has announced the availability of its Closed-Loop Email Analysis and Response (CLEAR) solution, a complete closed-loop approach to instant end user email reporting, analysis and remediation to stop potentially malicious emails that pass through perimeter defences. Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, […]


The Godfather Part 4: Cybercrime isn’t personal, it’s strictly business

Aatish Pattni, Regional Director of UK and Ireland for Link11, highlights the parallels between today’s organised cybercriminal gangs and their historic predecessors, the Mafia. When many of us hear the term ‘Mafia’, we instantly conjure up the thought of ’wise guys’ in pinstripe suits of the 1920s and 30s personified by Al Capone, or those […]


Kuwait and US sign deal on cybersecurity cooperation

Salem Muthib Al-Athainah, the Chairman and CEO of Kuwait’s Communication and Information Technology Regulatory Authority (CITRA), and Robert Strayer, US Deputy Assistant Secretary of State for Cyber and International Communications and Information Policy, have signed a letter of intent on cooperation in cybersecurity. The document, inked on the fringes of His Highness the Amir of Kuwait […]


New certification programme announced for mobile-connected IoT devices

CTIA, the wireless industry association in the United States, has announced the creation of the CTIA Cybersecurity Certification Programme for cellular-connected Internet of Things (IoT) devices. The programme is the first of its kind to be developed in collaboration with the nationwide wireless providers. By offering certification for IoT devices built from the ground up […]


‘Zero trust security approach is gaining acceptance’: Centrify expert

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security approach’ is increasingly gaining acceptance. The concept of zero trust is as profound in cybersecurity as the sweeping […]


Browse our latest issue

Intelligent CISO

View Magazine Archive