Magazine Button

Networking

Research reveals how criminals target fax machines to ambush networks

New research from Israel-based global software provider, Check Point Software Technologies Ltd., has shown how organisations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions of fax devices globally. A fax number is all an attacker needs to exploit the flaws and […]


McAfee releases new research on cyberthreat to medical devices

McAfee’s Advanced Threat Research team has released two pieces of new research that reveal undiscovered links among major North Korean threat actors and malware families, as well as stunning revelations about the real cyberthreat risks to medical devices. The research was announced during Black Hat USA 2018, which took place between August 4 and 9. Douglas McKee, Senior Security […]


AlgoSec expert on making network security DevOps friendly

Anner Kushnir, VP of Technology at AlgoSec, looks at how the DevOps process can become more agile and more secure using a ‘connectivity as code’ methodology. DevOps is all about agility, with fast, short delivery cycles and automation for software development and applications. Enabled by recently-introduced technologies such as virtualisation, cloud and SDN, spinning up […]


Government agency selects Napatech for lawful interception application

Napatech, a leading provider of reconfigurable computing platforms, has announced that one of Central Europe’s leading cybersecurity government agencies has selected Napatech’s FPGA-based SmartNIC software and hardware to strengthen its national security posture within new lawful interception applications. Lawful interception refers to the methods and procedures by which government agencies with legal authorisation can selectively […]


Allot, McAfee and Telefonica join to pioneer cybersecurity solution

Allot Communications Ltd., a leading global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, joined forces with McAfee, the device-to-cloud cybersecurity company, and Telefonica to deliver an innovative, comprehensive cybersecurity solution for small and medium businesses (SMBs) which covers both fixed and mobile networks as well as device (PC […]


eSentire and Cyxtera partner to provide zero-trust network protection

eSentire, a pure-play Managed Detection and Response (MDR) provider, and Cyxtera Technologies, the secure infrastructure company, have announced a strategic partnership to bring customers comprehensive security solutions designed to secure today’s modern hybrid IT environment. The partnership combines eSentire’s 24×7 Managed Detection and Response (MDR) with Cyxtera’s AppGate SDP zero-trust network offering, delivering industry-leading prevention […]


Keysight to offer packet-level visibility into workloads in containers

Keysight, the test, measurement and visibility vendor, has extended the Ixia CloudLens visibility platform to offer packet-level visibility into workloads in containers and Kubernetes clusters. Containers are becoming more popular in cloud environments. Gartner reports that ‘container popularity will continually increase over the next 18 to 24 months’ and that by 2020, more than 50% […]


‘Prevention is better than a cure’ – Network security expert

Yoram Ehrlich, VP of Products, Niagara Networks, discusses why prevention is better than cure when it comes to network security.  An ounce of prevention Benjamin Franklin’s famous saying, ‘an ounce of prevention is worth a pound of cure’ is as good as it gets when considering network security. When facing intelligent, determined enemies, one must […]


Is it becoming easier for cybercriminals to access company data?

Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox, looks at how companies can balance giving employees freedom to use their devices in the workplace while ensuring the network remains secure. We are in the age of the ‘office of the future’ – every company now battles it out to attract staff and clients […]


Pulse Secure expert on the mutation of ransomware

Ransomware attacks have been responsible for bringing entire cities to a crippling halt this year and methods are constantly evolving. Scott Gordon, InfoSec Evangelist, Pulse Secure, discusses how enterprises and organisations can fortify their networks by implementing layered defences and applying secure access solutions.   In the last few months, mounting ransomware gangs have hit […]


Browse our latest issue

Intelligent CISO

View Magazine Archive