Magazine Button


Study finds organisations still plagued by phishing emails

A study has found that 54% of organisations continue to be plagued by phishing emails with 85% of respondents agreeing that employees need better inbox tools to detect sophisticated messages. IRONSCALES also asked the 300 IT and security professionals spoken with during this year’s Infosecurity Europe how prepared their organisation was to deal with email […]

SANS Internet Storm Center analyses spread of router attacks

Johannes Ullrich, Dean of Research at SANS Institute and founder of the Internet Storm Center, discusses the cyber-risk to routers and the trends his team has seen in the Middle East.  These days, any unprotected or inadequately protected device exposed to the Internet is at risk of attack from cybercriminals. This includes routers that businesses […]

F5 Newtorks research reveals Russian cyberattacks on Singapore

Cybersecurity researchers at F5 Networks, an American application services and security company, have released a report which identifies a series of cyberattacks targeting Singapore on June 11 and 12 2018. F5 Networks said Russia has been launching a steady barrage of coordinated cyberattacks against the US as many sanctions have been issued against Russian officials […]

Trend Micro report reveals Middle East is hot target for cyberattacks

New research has revealed that the majority of the Middle Eastern countries, especially those in the GCC, are a hot target for cyberattacks. According to a newly-released report by Trend Micro Incorporated, a global leader in cybersecurity solutions, ransomware remains a widespread threat in the UAE with the country accounting for 2.4 million  of the […]

Kaspersky Lab unveils State of Industrial Cybersecurity 2018 report

The trend for digitalisation, including increased connectivity and IoT, is growing among industrial organisations such as power plants, manufacturers and water treatment centres, which rely on industrial control systems (ICS) for their operations. It’s a trend that comes with acknowledged cybersecurity dangers – 65% of companies believe that ICS security risks are more likely with […]

Kaspersky Lab updates IT Security Calculator tool

With IT budgets under pressure to transform and improve multiple areas of an organisation and business leaders needing to demonstrate return on every investment, the onus has long been on IT security to prove its worth. But proving ROI has traditionally been a struggle for IT professionals, who need to balance budget limitations while staying […]

McAfee highlights blockchain cybersecurity risks

McAfee, the device-to-cloud cybersecurity company, has released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies. The firm has also asserted the necessity of making cybersecurity a top priority as industry builds out the foundations for the widespread implementation of blockchain technologies. Demand for blockchain technology continues to grow among some of the […]

Security awareness hindered by lack of time, budget and resources

SANS Security Awareness, a leading provider in security awareness training and a division of SANS Institute, has released its 2018 Security Awareness Report Building Successful Security Awareness Programs. The report found that cybersecurity awareness programmes are beginning to gain ground among businesses but that many of the professionals responsible for their implementation are challenged by […]

Compliance worries prevent greater cloud use, WinMagic survey reveals

New research released by WinMagic shows that 87% of IT decision makers (ITDMs) limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter (24%) said it meant they only work with a single cloud vendor in their infrastructure, rather than exploit the benefits of a multi-cloud environment, such as […]

Research reveals smartwatches could become tools for spying

New research from Kaspersky Lab has revealed that smartwatches can become tools for spying on their owners, by collecting silent accelerometer and gyroscope signals that – after analysis – could be turned into datasets unique to the smartwatch owner. These datasets, if misused, allow the user’s activities to be monitored, including the entering of sensitive […]

Browse our latest issue

Intelligent CISO

View Magazine Archive