Magazine Button

Networking

Armis and Eseye announce availability of solution to secure connected devices on cellular networks

Global connectivity specialist, Eseye, and leading agentless device security platform provider, Armis, have announced the general availability of a joint solution that enables organisations to deploy connected devices anywhere in the world with enterprise-class security and consistent, reliable cellular (4G/LTE/5G) connectivity.  Digital Transformation created a new generation of connected things that extend beyond traditional IT and across virtually every […]


Extreme ensures security across service provider data centre and mobile Edge network infrastructure

Extreme Networks, a cloud-driven networking company, has announced Extreme Trusted Delivery, a carrier-grade solution designed to protect critical network infrastructure and ensure it is performing as anticipated without interference, regardless of location. Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular Edge sites, as well as within colocation and data centre environments where […]


Cybersecurity predictions: Identity protection to be a priority in 2022

Every year, IT and cybersecurity firms round up their predictions on their expectations for the immediate future. While predictions have a particular pull factor in the marketing sense of the word, experts from Attivo Networks share their evidence-based forecasts into cyberattacker behaviour and tactics, techniques and procedures (TTPs). The 2021 Verizon Data Breach report highlighted […]


How to communicate DDoS threats to the board

Executive boards need to understand the severity of potential DDoS attacks to their company networks and prepare accordingly. Ashley Stephenson, CTO, for Corero Network Security, discusses the importance of communicating this to the C-suite for them to respond appropriately with adequate security budgets. Being in the security department isn’t easy. In fact, corporate security practitioners […]


First steps to SASE – A unified digital approach for forward-thinking companies

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the importance of utilising SASE as the demand for simple and cost-effective solutions to help support a long-term remote workforce remain. The […]


70% of UK businesses have been the victim of a successful network security attack in the last year

More than two-thirds (70%) of UK businesses have been the victim of a successful network security attack in the last year and 65% have been the victim of at least one ransomware attack in the last 12 months, according to new research from Barracuda. These findings were released in a new report titled: The state of […]


Nokia addresses network security as part of its 5G certification program

Nokia has announced a new professional level 5G course and certification aimed at network security. The Nokia Bell Labs 5G Secured Networks course is part of Nokia’s program to train and certify industry professionals on 5G technology from network access to application management. The newly launched Nokia Bell Labs 5G Secured Networks course addresses the […]


T-Mobile selects Nokia to deliver managed security services and optical network modernisation

Nokia has announced it has been selected by T-Mobile Netherlands as a strategic partner to accelerate Digital Transformation while securing its fixed and mobile networks against cyberthreats. The partnership will provide the operator with a wide range of managed services including automated network and security operations, as well as a service-centric optical network over the course […]


How to prevent ransomware attacks: Top things to keep in mind

Ransomware has posed a significant threat to organisations this past year and CISOs need to ensure they have all bases covered when it comes to security. Renee Tarun, Deputy CISO/ Vice President Information Security, Fortinet, suggests nine factors to consider in order to have the best chance of avoiding a ransomware attack. Ransomware attacks have become […]


IoT – The new entry point for ransomware

Organisations can come under threat if they fail to monitor and secure their IoT devices. Charaka Goonatilake, CTO, Panaseer, discusses the ways in which organisations need to be more aware of the security risks associated with IoT technology in order to ensure they can safely harness it for a long time to come. The past […]


Browse our latest issue

Intelligent CISO

View Magazine Archive