Magazine Button

Software

Cloud container vulnerabilities soar, Skybox Security finds

Skybox Security, a global leader in cybersecurity management, has announced the release of the mid-year update to its 2019 Vulnerability and Threat Trends Report, analysing the vulnerabilities, exploits and threats in play over the first half of 2019. The report, compiled by the team of security analysts at the Skybox Research Lab, aims to help organisations […]


Are humans more effective than automation tools for discovering security vulnerabilities

HackerOne, a leading hacker-powered security platform, has announced the results of a study that revealed the majority of security professionals believe humans remain more effective than machines when it comes to securing digital assets. The study, which was carried out at Infosecurity Europe in June 2019, revealed that 53% of security professionals believe the outsider […]


Nearly everyone has been hacked, says J2 Software CEO

As business embraces opportunities from cloud and mobile computing to connect with customers, they take on new risks. And, according to J2 Software, there is a steady increase in destructive, sophisticated cyberattacks and ransomware. This is according to its security specialist and CEO, John McLoughlin. Without knowing it, nearly everyone has already been hacked regardless […]


Police are facing calls to halt the public use of facial recognition software

Police are facing calls to halt the public use of facial recognition software to search for suspected criminals after academics from the University of Essex found matches were only correct in one in five cases and the system was likely to break human rights laws. Jason Tooley, Board Member of techUK and Chief Revenue Officer […]


AI in cybersecurity – friend or foe?

Paul Dignan, Systems Engineering Manager, F5 Networks, discusses the benefits of utilising Artificial Intelligence (AI) and the advancements it offers the cybersecurity industry if deployed correctly. He says that AI can be both a destructive tool, or vital for business development. It’s no news that advances in AI and Machine Learning have enormous transformative potential […]


A quarter of people in EMEA prefer their cybersecurity managed by AI in new survey

Palo Alto Networks finds over half of respondents take responsibility for their data online. An online study of more than 10,000 respondents in EMEA conducted by Palo Alto Networks and YouGov alongside Dr Jessica Barker, an expert in the human nature of cybersecurity, explores attitudes towards new cybersecurity technologies, such as Artificial Intelligence (AI), and […]


SD-WAN For MSSPs: Interview with Interface Security Systems expert

Interface Security Services is a cloud-based managed security services provider that delivers secure IoT to its customers. In this video, you can find out how Fortinet’s Secure SD-WAN solution helps support constant Internet availability and resiliency through its partnership with Interface Security Systems.


Technology lab focused on wildlife protection opens in Kenya

In partnership with Fauna & Floral International (FFI), Liquid Telecom and Arm, and supported with initial funds from The Royal Foundation, OI Pejeta Conservancy in Kenya has opened a Conservation Tech Lab to research, test support and develop new technology-based solutions to conservation challenges around the world. It is hoped that the facility will help […]


RedSeal launches new suite of professional services

RedSeal, a leader in network cyber-risk modelling for hybrid environments, has introduced a new portfolio of professional services to help customers reduce cyber-risk and improve the productivity of their security teams. Organisations in both public and private sectors use the RedSeal platform – which acts as a force multiplier for every security device within a […]


Engineering a new method for data destruction

Xperien is now able to professionally erase data on retired IT assets in compliance with the Protection of Personal Information Act (PoPIA). It offers safe and secure data destruction services and all its methods are accompanied by certificates that will be required for an audit trail. Xperien Senior Business Development Manager Bridgette Vermaak says data […]


Browse our latest issue

Intelligent CISO

View Magazine Archive