Magazine Button


The rising threat of lookalike domain attacks

Mohammed Al-Moneer, Regional Sr. Director, META at Infoblox, tells us how to recognise four types of lookalike domain attacks that all organisations should be on the lookout for. If you think you’re seeing double, you probably are. Website domains, that is. Yet, despite the growing threat of lookalike domains, a targeted form of phishing where […]

Venafi Report: Navigating cloud-native security and machine identities

A report from Venafi highlights the urgent need for improved machine identity management in cloud-native environments, as organisations grapple with the security implications of rapid technological advances and the integration of microservices architectures. The Impact of Machine Identities on the State of Cloud-Native Security 2023 research report from Venafi examines how to maximise competitive advantages […]

Younger consumers 7x more likely to exercise their data rights, new Cisco survey shows 

Cisco’s 2023 Consumer Privacy Report explores 2,600 consumers’ perceptions of data privacy and the impact of AI in that context. It uncovers the younger generation’s interest in taking action to protect their privacy and the want for the government to take a leadership role in protecting privacy. Cisco has published its 2023 Consumer Privacy Survey, […]

Ransomware attacks double in municipalities, healthcare, education

Barracuda Networks, provider of cloud-first security solutions, published its Fifth Annual Threat Spotlight on Ransomware. The new report looks at ransomware attack patterns that occurred between August 2022 and July 2023. Barracuda researchers analysed 175 publicly reported successful ransomware attacks across the world between August 2022 and July 2023, and in the primary categories Barracuda […]

Infoblox report reveals 66% of UAE organisations experienced data breaches in the past year

Infoblox commissioned a survey in July/August 2022 through independent research firm, CyberRisk Alliance. The report surveyed IT and cybersecurity decision-makers and influencers from 13 countries — including 100 UAE–based organisations of all sizes. UAE respondents ranged from chief executives and directors to analysts and consultants. They were employed in various industries, with most from manufacturing […]

New survey by HID reveals five pressing themes reshaping the security industry

Sustainability, mobile IDs and a changing workforce continue to be among top concerns for the industry according to HID’s State of the Security Industry Report. HID, a worldwide leader in trusted identity and physical security solutions, has announced its inaugural State of the Security Industry Report, which gathered responses from 2,700 partners, end-users and security […]

Group-IB uncovers fake job pages targeting Arabic speakers in Egypt and other MEA countries

Group-IB, a global cybersecurity leader headquartered in Singapore, has published new research detailing a novel and ongoing fake job scam campaign targeting Arabic speakers in the Middle East and Africa (MEA) region. Digital Risk Protection (DRP) experts at Group-IB’s Threat Intelligence and Research Center in Dubai discovered and analysed more than 2,400 fake job pages […]

Study shows companies struggling with mobile device management due to employee turnover, security and supply chain

Businesses are re-evaluating how they manage devices, applications and data across a sprawling mobile landscape, according to a new Vanson Bourne report commissioned by Tangoe – a leading technology expense and asset management company. The study reveals a troubling challenge: Every company is reliant on mobile devices, but that dependence creates a sizable drag on already […]

FortiGuard Labs predicts convergence of advanced persistent threat methods with cybercrime

Fortinet, a global leader in the cybersecurity field, has unveiled predictions from the FortiGuard Labs global threat intelligence and research team about the cyberthreat landscape for 2023 and beyond. Highlights of the predictions and key takeaways for CISOs can be found below: 1 – Success of RaaS is a preview of what’s to come with CaaS Given […]

How to secure high-performance data

Ransomware and cyberattacks are taking place more and more frequently. High-performance environments are rich in high-value data, often containing personal, business, financial, IP, or even nationally significant data, meaning that they are at increased risk and must be protected. Yet, traditionally, data protection has not been top of mind for High-Performance Computing (HPC) users. Historically, […]

Browse our latest issue

Intelligent CISO

View Magazine Archive