More News

Are physical security features still needed on identity documents?

By Vincent Gourmelen, ID Card Solutions Product Manager, Citizen Identity Solutions at HID Global At a time of strong data encryption, on-chip biometry checks, digital signatures or national public key directories...

Be on the ball and avoid falling foul of cybercriminals at World Cup

As the drama of the World Cup intensifies, football fans around the globe will be readying themselves for the final stages of the tournament. And as cybercriminals also prepare for the spectacle,  Jan van Vliet, VP a...

DigiCert issues warning over encryption ahead of Chrome updates

DigiCert, a leading global provider of SSL/TLS certificates and other PKI solutions for securing web traffic and the Internet of Things (IoT), is providing industry guidance that millions of websites are not encrypted...

Effective cloud security requires a dedicated hybrid approach

As more businesses embrace digital transformation strategies, there is a growing need to ensure robust cloud security solutions are in place. Riaan Badenhorst, General Manager, Kaspersky Lab Africa, discusses the...

SOC teams struggling to detect malicious emails, research shows

A study of IT and security professionals has found that 55% cite the time to detect phishing messages as the greatest challenge facing the SOC/security team in relation to addressing emerging email threats. Performing...

Check Point expert digs into the future of cryptomining botnets

By Gadi Naveh, Threat Prevention Evangelist, Check Point The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a ...

Browse our latest issue

Intelligent CISO

View Magazine Archive