Magazine Button

More News

Cisco expert on building and securing the 5G networks of tomorrow

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will open up new risks. Ensuring the security of the SP network infrastructure, the business and its customers will require a holistic approach says Ali Amer, Managing Director, Global Service Provider Sales, Cisco Middle East and Africa. Every new generation […]


Kaspersky Lab will showcase security solutions at GITEX 2018

Kaspersky Lab will be presenting Kaspersky Threat Management and Defense at GITEX 2018 along with its other solutions. Kaspersky Threat Management and Defense brings together and reinforces the capabilities of Kaspersky Anti Targeted Attack, Kaspersky Cybersecurity Services and new Kaspersky EDR within a single platform. It gives businesses and governments the opportunity to adopt a […]


CyLon welcomes new cyber startups to London accelerator programme

CyLon has announced the nine cybersecurity startups participating in its eighth London accelerator programme. The company finds, grows and invests in the best emerging cyberbusinesses via its world-leading accelerator programmes. CyLon has already successfully accelerated 59 companies across hubs in London and Singapore since its launch in April 2015 and has a portfolio of international […]


IDC expert on why security is vital to organisational success

Security is as vital to organisational success as technology and people, says Mark Walker, Associate Vice President of Sub-Saharan Africa at International Data Corporation (IDC). Search for security on Google. The engine will autofill with – security is like oxygen and security is like an onion. Both are true. Security is the oxygen that keeps the […]


Ping Identity announces AI-driven solution to secure APIs

Ping Identity, a leader in identity defined security, has announced the general availability of PingIntelligence for APIs, following its acquisition of Elastic Beam earlier this year. The AI-powered solution is part of the Ping Identity Platform and brings an increased level of intelligence into how APIs are accessed and used to protect API infrastructures from […]


Prevent your network from being attacked by a Botnet

Not having enough network protection may allow your organisation’s devices to be part of the next cyberattack, according to Harish Chib, Vice President, Middle East and Africa, Sophos. Botnets are large volumes of distributed networked computers and devices that have been taken over by a cybercriminal. Botnets, also referred to as bots, are usually taken […]


Trend Micro releases findings of survey on IoT deployment decisions

Trend Micro, a global leader in cybersecurity solutions, has revealed that organisations around the world are exposing themselves to unnecessary cyber-risk by failing to give IT security teams a voice when planning Internet of Things (IoT) project deployments in enterprise environments. A survey of 1,150 IT and security decision makers in Germany, France, Japan, the […]


Proofpoint launches closed-loop email analysis and response solution

Proofpoint, a leading cybersecurity and compliance company, has announced the availability of its Closed-Loop Email Analysis and Response (CLEAR) solution, a complete closed-loop approach to instant end user email reporting, analysis and remediation to stop potentially malicious emails that pass through perimeter defences. Once reported, CLEAR automatically analyses messages against multiple intelligence and reputation systems, […]


Huawei shares vision of collaborative and open cyberspace

Mika Lauhde, Vice President of Cyber Security and Privacy, Global Public Affairs at Huawei Technologies, shared his vision of a new frontier for cybersecurity regulations during a keynote in Manama, Bahrain. His speech called for increased international cooperation between policy-makers, governments and private organisations in order to build an open and collaborative cyberspace capable of […]


Kuwait and US sign deal on cybersecurity cooperation

Salem Muthib Al-Athainah, the Chairman and CEO of Kuwait’s Communication and Information Technology Regulatory Authority (CITRA), and Robert Strayer, US Deputy Assistant Secretary of State for Cyber and International Communications and Information Policy, have signed a letter of intent on cooperation in cybersecurity. The document, inked on the fringes of His Highness the Amir of Kuwait […]


Browse our latest issue

Intelligent CISO

View Magazine Archive