Magazine Button

Top Stories

Fortinet announces its acquisition of AccelOps

Fortinet has announced its acquisition of AccelOps. The acquisition further extends Fortinet’s recently announced Security Fabric strategy by enhancing network security visibility, security data analytics and threat intelligence across multi-vendor solutions. “Sixty-percent of all security breaches result in stolen data starting within minutes of the breach and go undetected due to ineffective threat monitoring and […]


Enterprises should focus on securing perimeter, says Gemalto

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organisations continue to believe that basic perimeter security technologies are effective against data breaches. This is one of the many findings of the third-annual Data Security Confidence Index released by Gemalto. Of the 1,100 […]


Ensuring an always-on business during the holiday season

With the vacation season approaching in the Middle East, employees in the region are looking to either fly back to their home countries or to holiday destinations with cooler climes. This does not mean, however, that expectations of continuous access to applications, services and data should be lowered. In fact, times when staff resources are […]


Understanding the common motives behind DDoS cyber attacks

Distributed denial-of-service (DDoS) attacks continue to be one of the most prevalent methods hackers use to disrupt businesses. Involving the use of multiple systems (personal computers, smartphones, etc.), DDoS attacks overload an organisation’s network by generating web traffic that can’t be accommodated by the system’s capacity limits. Unlike with other forms of cyber attacks, DDoS […]


Exclusive Networks and SentinelOne to bring nextgen endpoint security into Africa

SentinelOne, the vendor company providing endpoint security by delivering real-time protection powered by machine learning and intelligent automation, announced its expansion into Europe, Middle East, and Africa through a strategic partnership with leading security distributor Exclusive Networks. SentinelOne and Exclusive Networks will partner to initially bring Next Generation Endpoint Protection to the EMEA region. Their […]


Cyberattacks on the rise across the GCC region

FireEye has recently revealed key insights on the state of cyber attacks across the EMEA (Europe, Middle East and Africa) region, particularly in the countries of the GCC (Gulf Cooperation Council). In recent years, the GCC states have witnessed a spate of attacks, targeting key industries and critical infrastructure. The Regional Advanced Threat Report for […]


Can you afford $500 per minute of internet downtime?

Many organisations have no clue how much one minute of internet downtime costs them, or haven’t stopped to think about it, says Tom Beinkowski, Director of Product Marketing at Arbor Networks. As a result, they greatly underestimate the impact of one of the most common causes of downtime – DDoS attacks. Almost every organisation now depends on the […]


Insight from DarkMatter on how to deal quickly with the SWIFT threat

A recent attack against the SWIFT international financial transaction system has focused attention on the potential cascading threat of an interconnected yet not fully integrated system.


Middle East banks hit by wave of targeted attacks

FireEye has recently revealed a wave of cyberattacks against banks in the Middle East. FireEye’s Dynamic Threat Intelligence (DTI) identified emails containing malicious attachments being sent to multiple banks in the region. The threat actors appear to be performing initial reconnaissance against would-be targets and were detected since they were using unique scripts not commonly […]


IDC identifies ways of securing smart digital enterprises

The results of a recent IT security survey of Middle East organisations conducted by International Data Corporation (IDC) show that the top three threats to enterprise security are infected USB drives, data theft by employees, and advanced persistent threats. These threats all have one aspect in common – insider risk. The fact that users do […]


Browse our latest issue

Intelligent CISO

View Magazine Archive