Magazine Button

Research

Verizon report urges businesses to ‘be prepared, proactive and practice’

Businesses are more aware than ever of how cybercrime could impact their reputation and their bottom line. Annual reports such as the Verizon Data Breach Investigations Report and the Verizon Insider Threat Report continue to flag those cyberthreats and trends that should be on every organisation’s radar. However, while knowledge is essential in understanding the […]


The reality of the cybersecurity landscape in Africa

There is a misplaced confidence in existing cybersecurity solutions and the beleaguered IT department that is leaving corporate doors wide open for attack.  The World Wide Worx State of Enterprise Security in South Africa 2019 report found that 99% of IT departments feel confident that they can protect the company and yet 45% say they […]


OpenText expert on revolutionising fraud investigation with AI

Law enforcement agencies are increasingly turning to innovative technologies in the fight against fraud. Simon Price, VP Sales, OpenText Legal Tech, tells us how the UK’s Serious Fraud Office is utilising OpenText solutions to investigate and prosecute cases efficiently in an age of data explosion. The latest figures from UK Finance revealed that the Dedicated Card and […]


EMEA identified as global hotspot for brute force access attacks

EMEA is a global hotspot for brute force access attacks, according to research from F5 Labs. The analysis forms part of the Application Protection Report 2019, which explores the fact that most applications are attacked at the access tier, circumventing legitimate processes of authentication and authorisation. Brute force attacks are typically defined as either 10 […]


Secureworks reveals details and tactics behind the LYCEUM threat group

The Secureworks Counter Threat Unit (CTU) has discovered that the threat group LYCEUM is targeting organisations in sectors of strategic national importance, including oil and gas and possibly telecommunications. The previously unobserved threat group has been targeting critical infrastructure for more than 12 months, with research indicating that the group may have been active from […]


Nominet research reveals CISOs views on cloud vs on-prem security

Nominet has announced its Cybersecurity and the Cloud research, which revealed that 61% of security professionals believe the risk of a security breach is the same or lower in cloud environments compared to on-premise. The research, surveying nearly 300 UK and US C-level security professionals, marks a tipping point in the perception of security of […]


Study explores importance of having an effective security approach

BitSight, the Standard in Security Ratings, has announced the availability of a new study that evaluates how executives understand and effectively measure their cybersecurity performance and adequately communicate it to the board, senior executives, customers and critical stakeholders. The September 2019 commissioned study conducted by Forrester Consulting on behalf of BitSight titled, Better Security And […]


The CISO Challenge: Managing Threats with Limited Resources

Learn more about the key findings of Making Tough Choices: How CISOs Manage Escalating Threats and Limited Resources, a report conducted by Fortinet and Forbes Insights.#


Cyber adversaries up the ante on evasion and anti-analysis to avoid detection

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their […]


F5 Labs finds ‘formjacking’ soars as hackers hit consumers at checkout

Online forms such as login pages and shopping baskets are increasingly hijacked by cybercriminals hunting for personal financial information (PFI), according to new research from F5 Labs. F5 Labs’ Application Report 2019 examined 760 breach reports and discovered that formjacking, which siphons data from the customer’s web browser to an attacker-controlled location, remains one of […]


Browse our latest issue

Intelligent CISO

View Magazine Archive