Magazine Button

More News

Poor security hygiene and risky applications enable cyberattacks to spread at record pace

Fortinet®, the global leader in high-performance cybersecurity solutions, has announced the findings of its latest Global Threat Landscape Report. The research reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed. Adversaries are spending less time developing ways to break in, and instead […]


Infoblox to demonstrate Actionable Network Intelligence platform at GITEX 2017

Infoblox Inc., has announced that it will demonstrate its revolutionary Actionable Network Intelligence Platform, a unified platform that empowers enterprises to elevate every aspect of network availability, agility, security, and performance – on-premises, across data centres, and in the cloud – at GITEX Technology Week, taking place between 8-12 October, 2017. Cherif Sleiman, Vice President, […]


SecureWorks amplifies application security with VMware AppDefense technology

SecureWorks Corp., a leading global cybersecurity company that keeps organisations safe in a digitally connected world, is developing a new managed solution that leverages VMware AppDefense™ technology to protect applications running on VMware vSphere®-based virtualised and cloud environments. The new service will be part of the SecureWorks Cloud Guardian™ portfolio and will deliver security detection, […]


Mobile Trojans steal Android users’ money through WAP-billing services

Kaspersky Lab researchers have discovered an unusual rise in mobile Trojan clickers that are stealing money from Android users through WAP billing – a type of direct mobile payment taken without any additional registration. This trend has not been observed for a while, but in Q2 of 2017 it became surprisingly common, with thousands of […]


Fluctuation in the exploit kit market – temporary blip or long-term trend?

Article by Rick Holland, Vice President, Strategy, Digital Shadows Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and attempt the exploitation of vulnerable software. Operated by various […]


Go back to the classroom to get ROI out of mobile security tools

Employees are placing a spanner in the works for companies implementing enterprise mobile device management (MDM) solutions to manage IT security risks, specifically in a bring your own device environment. They haven’t bought into the idea of enterprise mobility management solutions and are reluctant to install them. The result: mobile management solutions just aren’t working […]


ROPEMAKER: email security weakness – vulnerability or application misuse?

Article by Matthew Gardiner, Senior Product Marketing Manager, Mimecast Most people live under the assumption that email is immutable once delivered, like a physical letter. A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining the security and non-repudiation of email; even for those that use SMIME or […]


New version of Faketoken Android trojan hunts for taxi and ride-sharing app users

Kaspersky Lab researchers have discovered a new modification of the well-known mobile banking Trojan Faketoken, which has been developed and is now able to steal credentials from popular taxi applications. The mobile app market is growing, and offering more and more services that store confidential financial data, including taxi services and ride-sharing apps that require […]


Best practices for Privileged Access Management

Article by: John Hathaway, Regional Sales Director, Middle East, BeyondTrust Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications and more. But unfortunately, with so much power inherent in privileged credentials, they are ripe for abuse by insiders and are […]


Arbor Networks in global first place when it comes to DDoS protection

The growing size, frequency and complexity of Distributed Denial of Service (DDoS) attacks presents a serious challenge for any business. A recent study by industry analysts, Quadrant Knowledge Solutions, has identified Arbor Networks as the global market and technology leader in providing DDoS mitigation solutions. This is according to Arbor Network’s Territory Manager for sub-Saharan […]


Browse our latest issue

Intelligent CISO

View Magazine Archive