Magazine Button

Top Stories

Public and private sectors vulnerable due to shortage of cyber security talent?

Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), recently released Hacking the Skills Shortage, a global report outlining the talent shortage crisis impacting the cybersecurity industry across both companies and nations. A majority of respondents (82% admit to a shortage of cyber security skills, with 71% of respondents citing this shortage […]


Arbor Networks releases global DDoS attack data for 1H 2016

Arbor Networks, the security division of NETSCOUT, has released global DDoS attack data for the first six months of 2016 that shows a continuing escalation in the both the size and frequency of attacks. Arbor’s data is gathered through ATLAS, a collaborative partnership with more than 330 service provider customers who share anonymous traffic data […]


Cisco cyber security report predicts next generation of ransomware

The Cisco 2016 Midyear Cybersecurity Report (MCR) finds that organisations are unprepared for future strains of more sophisticated ransomware. Fragile infrastructure, poor network hygiene, and slow detection rates are providing ample time and air cover for adversaries to operate. According to the report’s findings, the struggle to constrain the operational space of attackers is the […]


Banking malwares Tinba, Gamarue inside Nigeria, Kenya

Check Point Software Technologies published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index presents a mixed view of Africa, with several countries making quite strong moves up and down the index – the higher their relative ranking […]


Kaspersky Lab discovers vulnerability in popular energy equipment

While performing a security assessment for one of its clients in the critical infrastructure sector, the Kaspersky Lab Security Services team discovered an important vulnerability. The CVE-2016-4785 vulnerability could allow an attacker to remotely obtain a limited amount of device memory content from relay protection equipment. The vulnerability was reported to Siemens, the equipment vendor, […]


Kaspersky Lab’s football tips for beating the hackers

The Euro 2016 football tournament, hosted by France, brings together 24 teams for 51 matches.  Millions of fans will be watching the games in stadiums and at public screenings.  Being a popular sport to watch in the Middle East, some employees have taken to working from mobile devices while watching a game with fellow supporters. […]


Mobile attacks on rise in Nigeria says Check Point Software

Quarterly analysis of the global Threat Index by Check Point Software Technologies reveals deep disparities in the threat environments in Africa, and the potential for increased attacks as cyber-criminals target mobile devices. Check Point is a global pure play network cybersecurity vendor, and its Threat Index provides a data based breakdown of new and prevalent […]


Results of the Infoblox Security Assessment report 1Q2016

Infoblox has announced results of the Infoblox Security Assessment Report for the first quarter of 2016, which finds that 83%—more than four out of five—of enterprise networks tested by Infoblox show evidence of malicious DNS activity. Infoblox offers free security assessments to customers and prospective customers, identifying DNS queries inside an organisation’s network that are […]


Report shows businesses fight ‘sudden death’ from DDoS attacks

A10 Networks has announced a new report with IDG Connect, “DDoS: A Clear and Ever Present Danger.” The report, which surveyed 120 IT decision makers at large organisations, finds businesses locked in combat with a growing army of online attackers. It finds that the average company suffers 15 DDoS attacks per year, with average attacks causing […]


The contours of a successful encryption strategy

Data is the new age currency and extremely valuable to organisations. However, there is somebody else who also has an eye on this data – the cybercriminal. While you leverage the potential of your organisational data to drive business growth, the cybercriminal sees your data as a money making opportunity. He wants to grab your […]


Browse our latest issue

Intelligent CISO

View Magazine Archive