Magazine Button

More News

Sectra Tiger mobile phone protects against Norwegian government agencies

Sectra (STO: SECT B) will now deliver its solution for secure mobile telephony, Sectra Tiger®/S 7401, to the Norwegian Armed Forces. Using Sectra Tiger/S 7401, officials in the Norwegian defence and civil authorities will be able to communicate classified information without a risk of eavesdropping. The Norwegian Armed Forces have been using an earlier generation […]


Critical considerations for effective security awareness training

Article by Morey Haber, Vice President of Technology at BeyondTrust One of my favourite spam emails are the ones from cybersecurity companies soliciting security awareness training for your employees. Think about it. You are receiving spam email, potentially a phishing attack, from a company offering services on how not to fall for a fraudulent email […]


Key Reinstallation Attacks (KRACK): The impact so far

A series of high-severity vulnerabilities affecting the Wi-Fi Protected Access II (WPA2) protocol were disclosed. Security researchers have developed a proof of concept (POC) demonstration, dubbed “KRACK”, and a dedicated website through which further details are likely to be released. An advisory was distributed by the US CERT to a select number of unidentified organisations […]


Emerging technologies help revolutionise public sector agencies

Advanced analytics and other emerging technologies are revolutionising the way governments and public service agencies are trying to address citizen demands, helping to overcome persistent challenges such as regulatory compliance, outdated legacy IT infrastructures and organisational cultures, according to a new research report from Accenture. The report, Emerging Technologies in Public Service, examines the adoption […]


The 5 most common router attacks on a network

Unfortunately, router attacks cannot be 100 percent prevented, but there are a few things that you can be doing to prevent one of the most common router attacks from occurring on your system and network. Large organisations are vulnerable to widespread attacks, with come being malicious and some carried out simply to prove a point. […]


Digital trust in the IoT era

As we use more and more connected devices and more and more of our day is filled with digital experiences, both personally and professionally, Digital Trust becomes key. This is due to so much data being created by those experiences, to improve those experiences, but also monetise those experiences. Having consumer trust in personal data […]


New global survey finds companies are unprepared for DNS attacks

Infoblox has released results of a global survey finding that DNS security is often overlooked when it comes to cybersecurity strategy, with most companies inadequately prepared to defend against DNS attacks. Surveying over 1,000 security and IT professionals worldwide and conducted by Dimensional Research, the study found that 86% of DNS solutions failed to first […]


Mimecast launches email archiving designed for cloud

Mimecast Limited, a leading email and data security company, has announced the launch of Mimecast Cloud Archive, the leading multipurpose archive solution built for the cloud. Mimecast Cloud Archive delivers an all-in-one cloud service that integrates: a secure data repository, built-in data recovery, storage management, e-discovery and compliance capabilities. Mimecast Cloud Archive enables customers to […]


INTERPOL and Kaspersky sign threat intelligence exchange agreement

Kaspersky Lab has reiterated its commitment to global collaboration in the fight against cybercrime by signing a threat intelligence sharing agreement with INTERPOL. The legal framework is designed to facilitate and develop cooperation between Kaspersky Lab and INTERPOL by sharing threat intelligence data on the latest cybercriminal activities, wherever they appear. With cyberthreats often borderless […]


Napatech and Credocom create joint solution for Palo Alto firewalls

Napatech announced today a joint solution with Credocom that uses Napatech’s Pandion network recorder to enable customers who use Palo Alto Networks’ firewall to see detailed information on security incidents. Ponemon Research found the average enterprise security team will see about 2500 security incidents per day, but they can only investigate about four percent of […]


Browse our latest issue

Intelligent CISO

View Magazine Archive