Magazine Button

Top Stories

Check Point Software security report highlights rise in cyberattacks and disruptive malware 

Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its 2023 Security Report reflecting on a chaotic year in cybersecurity. The report looks back on a tumultuous 2022, which saw cyberattacks reach an all-time high in response to the Russo-Ukrainian war. Education […]


Anticipating APAC-specific fraud risks in 2023

Dany Naigeboren, Head of Analytics, APAC, Forter, tells us the individual nuances of a complex and dynamic market will dictate threats faced. While digital commerce continues to develop in the region that’s home to more than half the world’s population, a looming economic downturn has given rise to new fraud risks. According to insights gleaned […]


Thales and Schiebel to deliver eyes in the sky for Royal Navy

Thales, a global technology leader, and Schiebel, an aviation and aerospace component manufacturer, have been awarded a contract by the UK Ministry of Defence to deliver a game-changing rotary wing Uncrewed Air System (UAS) to provide a protective ‘eye in the sky’ capability for Royal Navy warships. The contract for the Peregrine system will see a rotary-powered UAS, […]


The ongoing data privacy challenge: Will European businesses comply?

The European Union Agency for Cybersecurity (ENISA) has discovered how technologies can support personal data sharing in practice, while global law firm, DLA Piper, focuses on how European businesses must pay closer attention to GDPR legislation.  The European Union Agency for Cybersecurity (ENISA), recently published its report on how cybersecurity technologies and techniques can support the implementation […]


Biometric authentication – a cure for the common password 

Debra Miller – Digital Marketing Communications Manager, HID, speaks to us about how biometric authentication provides a cure for the common password.  From 2019 through 2021, nearly 1,900 healthcare data breaches of 500 or more records have been reported to the Health and Human Services’ Office for Civil Rights. Those breaches exposed the sensitive and supposedly protected […]


Coventry University achieves first-class results with enhanced endpoint security strategy

Coventry University has leveraged CrowdStrike Falcon Complete managed detection and response (MDR) for comprehensive protection of a dynamic campus environment. Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect at Coventry University, discusses the project and the business benefits in more detail. Stability and predictability are the cornerstones of an effective security programme. Steve Rogers, Enterprise […]


Energy providers urged to power up security solutions against emerging threats

Antoine Harb, Team Leader, Middle East, Kingston Technology, says energy companies have never been more vulnerable to cyberattack. The energy sector has emerged as a primary target for cybercriminals, its Intellectual Property (IP) and critical data have never been more vulnerable – while rising prices and geopolitical motives are other factors behind frequent attacks. According […]


The foundation of secure hybrid work lies in Zero Trust

Kurt Goodall, Troye Technical Director, tells us IT departments must adopt a new security approach to protect a dynamic workforce. As more and more knowledge workers are opting for hybrid work models due to the increased freedom and flexibility, it presents both benefits and challenges to IT organisations. The research suggests that 57% of workers […]


Credit card fraud soars to a 10-year high

Credit card application fraud rose by 18% in the last quarter of 2022, with fraudsters looking to take advantage of Personally Identifiable Information (PII) and take out credit and borrowing in an account holder’s name.  The rise means the overall fraud rate for 2022 was the highest yearly rate recorded by Experian in the last […]


Stopping modern attacks requires XDR with identity

Kapil Raina, Identity Protection Evangelist at CrowdStrike, explains why identity protection is crucial, how this differs from what IAM vendors provide and what organisations need to know when they evaluate security vendors. As organisations have strengthened protection for their networks and endpoints, compromising identities has become a focal point of infiltrating organisations. We’ve seen a […]


Browse our latest issue

Intelligent CISO

View Magazine Archive