Magazine Button

Top Stories

Positive Technologies helps eliminate software vulnerability

ICS Security expert at Positive Technologies, Alexander Melkikh, discovered a vulnerability in PRTG Network Monitor software developed by Paessler, Germany. The software is used by a number of companies in various industries to control the condition of devices on the network. Currently there are over 16,000 hosts which have this software in the USA, Brazil, […]


Data processing in cloud environments: Managing security and compliance

Modern enterprises are facing the challenge of achieving robust security and compliance while they leverage their vast stores of data in the cloud. Anurag Kahol, CTO at Bitglass, discusses this challenge and unveils the capabilities that help enable organisations to process cloud data effectively and securely. Today’s data sovereignty regulations mean that data is subject […]


Trend Micro research urges oil and gas industry to prioritise cybersecurity

Trend Micro, a global leader in cybersecurity solutions, has announced the findings of new research on the cyber-risks facing the oil and gas industry. The research found that the oil and gas industry and its supply chain face increased risk from advanced threat groups and others as they continue to build out digitally connected infrastructure. […]


How your legacy applications and hardware can damage security posture

Tarik Saleh, Senior Security engineer and malware researcher at DomainTools, explains what organisations should do to protect their Windows 7 environment, should they not be able to perform the upgrade before the deadline of January 2020. Upgrading the operating systems of an entire IT environment is indeed a demanding process which requires planning and preparation. […]


Fortanix expert on how European companies are taking back control of their data in the cloud

When running workloads with sensitive and regulated data in the cloud, organisations are seeking greater options to enable them to protect and control that data themselves. Faiyaz Shahpurwala, Chief Product Officer at Fortanix, tells us how, by taking control of their encryption keys, organisations will be able complete their Digital Transformation journeys and start applying […]


Accenture Security Israel aims to tackle security threats

Can you out-innovate a cybercriminal? Accenture Security Israel is looking for passionate, creative people to tackle the biggest security threats facing us today. Join the team.


Mimecast research finds data loss is primary concern for financial industry

Mimecast has announced new research commissioned by IDG Research on the factors leading financial services organisations to reprioritise how they manage compliance. Financial services organisations like retail banks, investment firms and insurance companies have always operated under stringent regulations and controls. However, increasing regulatory frameworks and evolving security threats are making compliance an increasing priority […]


Sophos uncovers new version of Snatch ransomware

Sophos, a global leader in next-generation cybersecurity,  has published an investigative report, Snatch Ransomware Reboots PCs into Safe Mode to Bypass Protection, by SophosLabs and Sophos Managed Threat Response. The report details the changing attack methods of Snatch ransomware, first seen in December 2018, including rebooting PCs into safe mode mid-attack in an attempt to bypass behavioural protections that […]


ServiceNow research shows that security breaches increased in 2019

ServiceNow, a leading digital workflow company making work, work better for people, has released its second sponsored study on cybersecurity vulnerability and patch management, conducted with the Ponemon Institute. The study, Costs and Consequences of Gaps in Vulnerability Response, found that despite a 24% average increase in annual spending on prevention, detection and remediation in […]


Pulse Secure and Nozomi Networks team up to deliver secure IIoT connectivity

Pulse Secure, a leading provider of software defined Secure Access solutions, and Nozomi Networks, a leader in OT and IoT security, have announced an integration that extends the zero trust protection provided by the Pulse Secure Access Suite to industrial IoT, ICS and OT technologies. The joint solution extends the discovery and classification of a […]


Browse our latest issue

Intelligent CISO

View Magazine Archive