Magazine Button

Networking

First steps to SASE – A unified digital approach for forward-thinking companies

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the importance of utilising SASE as the demand for simple and cost-effective solutions to help support a long-term remote workforce remain. The […]


70% of UK businesses have been the victim of a successful network security attack in the last year

More than two-thirds (70%) of UK businesses have been the victim of a successful network security attack in the last year and 65% have been the victim of at least one ransomware attack in the last 12 months, according to new research from Barracuda. These findings were released in a new report titled: The state of […]


Nokia addresses network security as part of its 5G certification program

Nokia has announced a new professional level 5G course and certification aimed at network security. The Nokia Bell Labs 5G Secured Networks course is part of Nokia’s program to train and certify industry professionals on 5G technology from network access to application management. The newly launched Nokia Bell Labs 5G Secured Networks course addresses the […]


T-Mobile selects Nokia to deliver managed security services and optical network modernisation

Nokia has announced it has been selected by T-Mobile Netherlands as a strategic partner to accelerate Digital Transformation while securing its fixed and mobile networks against cyberthreats. The partnership will provide the operator with a wide range of managed services including automated network and security operations, as well as a service-centric optical network over the course […]


How to prevent ransomware attacks: Top things to keep in mind

Ransomware has posed a significant threat to organisations this past year and CISOs need to ensure they have all bases covered when it comes to security. Renee Tarun, Deputy CISO/ Vice President Information Security, Fortinet, suggests nine factors to consider in order to have the best chance of avoiding a ransomware attack. Ransomware attacks have become […]


IoT – The new entry point for ransomware

Organisations can come under threat if they fail to monitor and secure their IoT devices. Charaka Goonatilake, CTO, Panaseer, discusses the ways in which organisations need to be more aware of the security risks associated with IoT technology in order to ensure they can safely harness it for a long time to come. The past […]


Prevention is key to protecting against ransomware attacks

The shift to remote working has triggered an eye-watering amount of ransomware attacks in recent months and business leaders must ensure they have the correct tools in place to secure their organisations. Keith Glancey, Systems Engineering Manager, Western Europe at Infoblox, discusses the rise in ransomware attacks and how organisations can protect themselves from cybercriminals.   […]


Palo Alto Networks and Google Cloud work to make cloud adoption more secure

Palo Alto Networks, the global cybersecurity leader, and Google Cloud have announced Cloud IDS (Intrusion Detection System), a jointly developed network threat detection service to help cloud customers solve critical network security challenges. Built with Palo Alto Networks’ industry-leading threat detection technologies, Cloud IDS provides simple, managed, cloud native network-based threat detection — offering Google […]


Cisco enables NBC to modernize Olympic Games coverage

NBC Olympics, a division of the NBC Sports Group, has selected Cisco to provide the networking technology to enable the first-ever all-IP delivery for its production of the Tokyo Olympic Games. The games take place from July 23 and August 8 and will be the first all-IP International Broadcast Center operation for NBC Olympics.  The […]


Proactively preventing cyberattacks and keeping the business operational with threat hunting

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure. What is threat hunting and why is it relevant to CISOs? Threat hunting […]


Browse our latest issue

Intelligent CISO

View Magazine Archive