Magazine Button

Top Stories

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types of attacks and highlights the importance of adding an extra layer of protection to your business to ensure […]


75% of Australian IT leaders attribute the size of today’s attack surface to web app proliferation

New research from Fastly shows over half of businesses struggle to reduce the risk of attacks, leaving them fearful of compromise, particularly by nation-states and other types of threat actors. Fastly, a global edge cloud platform provider, has released new research in partnership with Ecosystm that shows 75% of Australian businesses are now living with […]


For MSSPs XDR can be the foundation of effective ‘living security’

Vibin Shaju, Presales Director – EMEA, Trellix, discusses the value of extended detection and response (XDR) for managed security service providers (MSSPs). Two years on from our planetwide migration to the cloud, the unease experienced by IT and security teams lingers. Consumers demand more and better digital experiences. Employees demand more flexible working conditions. The […]


Securing the transportation sector in the digital age

Nozomi Networks enables transportation companies secure OT and IoT architectures and reveals its key solutions into how regional transportation and logistics companies can secure operations in the digital age. Thales, another leader in the cybersecurity transportation field, has revealed its connected and cybersecure solution which will improve interoperability for airlines and pilots and optimise flight […]


Cyberattacks against UK CNI increase amidst Russia-Ukraine war

The systems that underpin the UK’s critical national infrastructure (CNI) are under increasing cyber threat. Over seven in 10 cybersecurity decision-makers at UK CNI organisations reported a rise in cyberattacks since the start of the Ukraine war, according to new research by UK cybersecurity services firm, Bridewell. The research, which surveyed 521 cybersecurity decision-makers in […]


Cabinet Office admits to losing nearly 800 devices

The Cabinet Office, the UK governmental body responsible for supporting the Prime Minister and Cabinet, has reported almost 800 electronic devices lost or stolen in the past three years, according to official figures. The data, retrieved via the Freedom of Information Act and analysed by niche litigation firm, Griffin Law, observed the number of electronic […]


Corero annual DDoS report exposes attacker behavior during pandemic

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions and recommendations based on DDoS attacks against Corero customers during 2021. The report, now in its 7th year, highlights that DDoS threats continue to grow in sophistication, size and frequency. Yet 2021 also reveals […]


DoJ announces new policy for charging cases under the Computer Fraud and Abuse Act

The Department of Justice has announced the revision of its policy regarding charging violations of the Computer Fraud and Abuse Act (CFAA).  The policy for the first time directs that good-faith security research should not be charged. Good faith security research means accessing a computer solely for purposes of good-faith testing, investigation and/or correction of a security […]


Trend Micro detected and blocked over 104 million threats in 2021 in UAE

Trend Micro Incorporated a global cybersecurity solutions provider, has released its 2021 annual cybersecurity report: Navigating New Frontiers. The report highlights the growing rate of cyber-attacks by malicious actors on digital infrastructures and individuals in the modern-day hybrid work environment. The report states that globally Trend Micro solutions stopped over 94.2 billion threats in 2021, […]


Netskope CISO on leading a successful security transformation with Security Service Edge (SSE)

In this interview with Intelligent CIO’s Jess Abell, Neil Thacker, EMEA and LATAM CISO for Netskope, highlights why traditional network security architecture is no longer fit for purpose, as well as why organisations should consider adopting a Security Service Edge (SSE) approach. Why is the traditional network security architecture not fit for purpose in the […]


Browse our latest issue

Intelligent CISO

View Magazine Archive