Magazine Button

Infographics

Mimecast report finds increase in Business Email Compromise (BEC) attacks

Mimecast, a leading email and data security company, has announced the availability of its latest Email Security Risk Assessment (ESRA). The quarterly assessment is an aggregated report of tests that measure the efficacy of widely used email security systems. This quarter’s ESRA report found a significant increase in Business Email Compromise (BEC) attacks, emails containing […]


nCipher Security announces new cloud-based HSM service

nCipher Security, an Entrust Datacard company, has announced nShield as a Service, a cloud-based hardware security module (HSM) service that allows organisations to protect sensitive data and applications and helps meet compliance mandates – simply and efficiently, using on-demand cryptography. “Organisations embracing cloud-first strategies require cloud-first encryption,” said Peter Galvin, Vice President of Strategy, nCipher […]


Phishing expert warns employees should not be able to derail operations

A cybersecurity specialist and penetration tester has cautioned businesses against relying on human instinct to defend against phishing attacks. Speaking at a security event in Manchester, Technical Director of cybersecurity firm Secarma, Holly Williams, said:, “Your users shouldn’t be your business’ first or last line of defence. There should be several lines of defence between […]


New RiskIQ report reveals £2.3m is lost to cybercrime every minute

RiskIQ, a global leader in attack surface management, has released its annual ‘Evil Internet Minute‘ report. The company tapped proprietary global intelligence and third-party research to analyse the volume of malicious activity on the Internet, revealing that cybercriminals cost the global economy £2.3 million every minute last year, a total of £1.2 trillion. The data […]


Research reveals payment-card fraud funds terrorism and other crimes

Researchers at Terbium Labs, a leading Dark Web data intelligence company, has released the findings of new research that examines the deeply intertwined nature of payment fraud and transnational crime. Results from the report titled, “The Next Generation of Criminal Financing: How Payment Fraud Funds Transnational Crime,” illustrate the far-reaching effect of payment fraud – […]


Cybersecurity risk is at critical level, according to SANS survey

People remain the greatest threat to industrial control systems (ICS) and associated networks, according to a new SANS survey focused on better understanding cybersecurity risks to operational technology (OT) systems. More than half of respondents also see the cyber risks to their safe and reliable operations as high or higher than in past years. A […]


64% of businesses have suffered insider breach, BeyondTrust reveals

BeyondTrust, a global leader in privileged access management, has released the 2019 Privileged Access Threat Report. In its fourth edition, the global survey explores the visibility, control and management that IT organisations across the globe – including the United Arab Emirates (UAE) and Saudi Arabia – have over employees, contractors and third-party vendors with privileged […]


Mimecast report finds phishing attacks on the rise in South Africa

Mimecast, a leading email and data security company, has unveiled its third-annual State of Email Security report. The report includes insights from 1,025 global IT decision makers. As cybercriminals continue to use email as a primary vehicle to steal data and deliver advanced threats, the results of this research provide valuable insights and trends around […]


Gigamon launches Application Intelligence framework

Gigamon, a leading network visibility provider for the digital enterprise, has introduced Gigamon Application Intelligence, which provides comprehensive visibility into the highly complex applications at the heart of Digital Transformations. As organisations rapidly evolve through their Digital Transformation journey, agile and highly distributed applications challenge IT teams to achieve and maintain the required security, performance […]


Altron Karabina expert on the having an effective BCDR strategy

Corne du Preez, Technology Solutions Professional: Apps and Infra, Altron Karabina, looks at how organisations can implement an effective BCDR strategy. When speaking to customers, I always ask what their BCDR strategies are. Sometimes I get good information from customers around their understanding of BCDR, but in most cases it seems that customers have given […]


Browse our latest issue

Intelligent CISO

View Magazine Archive