Magazine Button

Top Stories

Containing and securing Shadow IT and technical debt

Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware of the environment in which it arises and why employees choose to use unmanaged apps and services. Here are some typical […]


Go Phish: Matias Madou, Co-founder and CTO of Secure Code Warrior

We ‘go phishing’ with Matias Madou, Co-founder and CTO of Secure Code Warrior, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? I think for me it was making the move to the defensive side of cybersecurity. Building a house to protect […]


LastPass calls for stronger cybersecurity practices across supply chains amid global pressure 

LastPass, a global leader in password management, is calling for organisations to take urgent action to improve supply chain vulnerability. Ransomware and supply chain attacks continue to threaten businesses worldwide and the results from a single attack could be devastating, causing halts in production, monetary loss or even reputational damage.   While it’s been a volatile […]


DigiCert acquires managed DNS services provider DNS Made Easy

DigiCert has acquired DNS Made Easy, a global provider of enterprise-grade managed Domain Name System (DNS) services, as well as affiliated brands, including Constellix. “The integration of DigiCert and DNS Made Easy adds value to customers,” said Greg Clark, Managing Partner at Crosspoint Capital Partners and Chairman of DigiCert’s Board of Directors. “In addition to […]


Report identifies 600 mobile apps for banking and examines the risk of Trojans targeting them

Zimperium – a mobile security platform purpose-built for enterprise environments – has published new research detailing the increasing risk financial institutions and consumers worldwide face due to Trojan horse malware targeting mobile applications. This new report titled, Mobile Banking Heists: The Global Economic Threat, examines more than 600 financial apps – which account for more than 1 […]


Global organisations concerned digital attack surface is spiralling out of control

Trend Micro, a leader in cloud security, has announced the findings of a new global study indicating that organisations are struggling to define and secure an expanding cyberattack surface, hampering risk management efforts. The study revealed that three-quarters (73%) of global organisations are worried about their growing attack surface. Over a third (37%) said it […]


Veracode unveils next-generation software security platform

Veracode, a leading global provider of Application Security Testing (AST) solutions, has announced its Continuous Software Security Platform, which seamlessly embeds application security into the Software Development Life Cycle (SDLC). The platform streamlines workflows by bringing together development and security teams to provide a broad understanding of risk, remediation guidance and progress at every stage of […]


Juniper Networks and Dragos partner to secure critical infrastructure

Juniper Networks – a leader in secure, AI-driven networks – and Dragos, a global leader in cybersecurity for Industrial Control Systems (ICS) and Operational Technology (OT) environments, have announced their commitment to securing critical infrastructure through an official joint partnership that provides an automation framework for active attack response for OT-ICS networks and systematises the research […]


Research reveals 40% of companies believe their cyber strategy will be outdated in under two years

A perfect storm of escalating cyberattacks and global tech innovation leaves 61% of Chief Information Security Officers (CISO) only ‘fairly confident’ of managing their current threat exposure. A recent report from Crossword Cybersecurity Plc explores the findings in more depth. Crossword Cybersecurity Plc, the cybersecurity solutions company focused on cyber strategy and risk, has released […]


Surrey Police and Sussex Police Access INTERPOL with Motorola Solutions’ Pronto

Frontline officers with Surrey Police and Sussex Police are using Motorola Solutions’ Pronto to gain immediate access to INTERPOL. This source of intelligence provides officers with important information to protect national security and enable daily productivity gains. Pronto is the most widely deployed mobile policing solution in the UK, improving public safety through features that enhance situational awareness including mobile biometrics and […]


Browse our latest issue

Intelligent CISO

View Magazine Archive