Are you over 18 and want to see adult content?
More Annotations
![Home - Hidden Router - Blazing Fast WiFi VPN Router and WireGuard VPN Service](https://www.archivebay.com/archive/8a25493f-14aa-44b5-938c-c18f8d7b4bf1.png)
Home - Hidden Router - Blazing Fast WiFi VPN Router and WireGuard VPN Service
Are you over 18 and want to see adult content?
![A complete backup of nationalkaraterochester.com](https://www.archivebay.com/archive/4e098658-cef0-45b6-ab6c-3cdf65796244.png)
A complete backup of nationalkaraterochester.com
Are you over 18 and want to see adult content?
![Friedrich-Alexander-Universität Erlangen-Nürnberg](https://www.archivebay.com/archive/77f17d21-56e1-4f5f-96dc-4285a77b1c58.png)
Friedrich-Alexander-Universität Erlangen-Nürnberg
Are you over 18 and want to see adult content?
![Viaggi nel mondo e tour fai da te | Evaneos](https://www.archivebay.com/archive/4334fa4a-c7a6-4a68-bc29-24e075a31fea.png)
Viaggi nel mondo e tour fai da te | Evaneos
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of https://savethefrogs.com](https://www.archivebay.com/archive6/images/157b84f5-4fd6-438a-a158-a8a881b5bea1.png)
A complete backup of https://savethefrogs.com
Are you over 18 and want to see adult content?
![A complete backup of https://howardcenter.org](https://www.archivebay.com/archive6/images/5846179d-4a1c-43a3-831d-f626197a3617.png)
A complete backup of https://howardcenter.org
Are you over 18 and want to see adult content?
![A complete backup of https://lynzyandco.com](https://www.archivebay.com/archive6/images/4ad895fb-bf4e-4ecc-a26f-f0787f2e101a.png)
A complete backup of https://lynzyandco.com
Are you over 18 and want to see adult content?
![A complete backup of https://capitaljazz.com](https://www.archivebay.com/archive6/images/da20ac04-5a14-4c76-8b9a-77075fd7d0fe.png)
A complete backup of https://capitaljazz.com
Are you over 18 and want to see adult content?
![A complete backup of https://vertigosoftware.com](https://www.archivebay.com/archive6/images/b5fbf85e-1150-46dc-80d1-942f6aceba93.png)
A complete backup of https://vertigosoftware.com
Are you over 18 and want to see adult content?
![A complete backup of https://maropost.com](https://www.archivebay.com/archive6/images/da82eb05-303c-413d-9932-b140d7a79538.png)
A complete backup of https://maropost.com
Are you over 18 and want to see adult content?
![A complete backup of https://gardinenwelt-angelina.de](https://www.archivebay.com/archive6/images/3a718ee6-924a-428b-a083-60b9c0deb899.png)
A complete backup of https://gardinenwelt-angelina.de
Are you over 18 and want to see adult content?
![A complete backup of https://enter21st.com](https://www.archivebay.com/archive6/images/0e1fc17e-0655-4e43-ae23-fd0dccd5c716.png)
A complete backup of https://enter21st.com
Are you over 18 and want to see adult content?
![A complete backup of https://menmania.pl](https://www.archivebay.com/archive6/images/623f9fc8-df91-4d3b-bdee-b838b84aac96.png)
A complete backup of https://menmania.pl
Are you over 18 and want to see adult content?
![A complete backup of https://2020cheapjordans.com](https://www.archivebay.com/archive6/images/47a2675f-1f17-41d2-bebc-c67705d1f6c8.png)
A complete backup of https://2020cheapjordans.com
Are you over 18 and want to see adult content?
![A complete backup of https://themanual.com](https://www.archivebay.com/archive6/images/025a0190-a042-4da8-a205-c8224766a176.png)
A complete backup of https://themanual.com
Are you over 18 and want to see adult content?
Text
CISOs in 2021, from
VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued PROOFPOINT’S STATE OF THE PHISH REPORT REVEALS RANSOMWARE Proofpoint, a leading cybersecurity and compliance company, has released its seventh annual State of the Phish report, which explores enterprise phishing experiences and provides an in-depth look at user awareness, vulnerability, and resilience. More than 75% of surveyed infosec professionals said their organisations faced broad-based phishing attacks-both successful and unsuccessful-in EDITOR'S QUESTION: HOW SHOULD CISOS PREPARE FOR LONG-TERM In the midst of COVID-19, we're seeing a pandemic of cyberattacks, says Adrian Taylor, EMEA VP, A10 Networks. “With 2020 dominated by the start of the COVID-19 pandemic, there was a sharp rise in cybercriminal activity,” said Taylor. “From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyberthreat landscape evolve. USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague VIASAT OPENS NETWORK OPERATIONS CENTRE AND CYBERSECURITY Viasat UK has announced the opening of its state-of-the-art Network Operations Centre (NOC) and Cybersecurity Operations Centre (CSOC) in Aldershot, UK. The facility will support defence, government and commercial organisations who rely on the guaranteed resilience of their networks and who are targeted by increasingly sophisticated cyberattacks from a growing number of adversaries. THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
HOME – INTELLIGENT CISO At least 25% of users in South Africa, Kenya and Nigeria are attacked by malware. Building a cybersecurity strategy for the long haul. Leading auto retailer selects Cohesity and Cisco for backup, restore and ransomware protection. Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO'S The priorities that should be covered in every CISO’s budget. To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities forCISOs in 2021, from
VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued PROOFPOINT’S STATE OF THE PHISH REPORT REVEALS RANSOMWARE Proofpoint, a leading cybersecurity and compliance company, has released its seventh annual State of the Phish report, which explores enterprise phishing experiences and provides an in-depth look at user awareness, vulnerability, and resilience. More than 75% of surveyed infosec professionals said their organisations faced broad-based phishing attacks-both successful and unsuccessful-in EDITOR'S QUESTION: HOW SHOULD CISOS PREPARE FOR LONG-TERM In the midst of COVID-19, we're seeing a pandemic of cyberattacks, says Adrian Taylor, EMEA VP, A10 Networks. “With 2020 dominated by the start of the COVID-19 pandemic, there was a sharp rise in cybercriminal activity,” said Taylor. “From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyberthreat landscape evolve. USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague VIASAT OPENS NETWORK OPERATIONS CENTRE AND CYBERSECURITY Viasat UK has announced the opening of its state-of-the-art Network Operations Centre (NOC) and Cybersecurity Operations Centre (CSOC) in Aldershot, UK. The facility will support defence, government and commercial organisations who rely on the guaranteed resilience of their networks and who are targeted by increasingly sophisticated cyberattacks from a growing number of adversaries. THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
NEW RESEARCH SHOWS CLOUD-NATIVE ARCHITECTURES BREAK Software intelligence company, Dynatrace, has announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps and agile methodologies has broken traditional approaches to application security. As organisations shift more responsibility 'left' to developers to accelerate innovation, increasingly complex IT ecosystems INFOBLOX REVEALS MALWARE CAMPAIGNS TRACKED IN Q1 2021 Craig Sanderson, Vice President of Security Products at Infoblox Security Solutions, discusses the Infoblox Q1 2021 Cyberthreat Intelligence Report and tells us: “Threat actors will both innovate, adjust and sustain proven methods as 2021 unfolds.” The Infoblox Q1 2021 Cyberthreat Intelligence Report provides original research and insight into threats we observed leading up to and THE UNIVERSITY OF ARIZONA SPEEDS UP COVID-19 VACCINE When the University of Arizona (UA) was chosen as a COVID-19 vaccine point of dispensing (POD), it wanted to put in place a distribution process to get the vaccines out to as many people as possible as quickly and efficiently as possible. To do this, it turned to Genetec, a leading technology provider of unified security, public safety, operations and business PROOFPOINT LAUNCHES INDUSTRY’S FIRST CLOUD NATIVE Proofpoint, a leading cybersecurity and compliance company, has announced several people-centric innovations across its three flagship platforms: Threat Protection, Compliance, and the new Information Protection and Cloud Security. Proofpoint’s Information Protection and Cloud Security Platform is the market’s first cloud native solution that combines enterprise data loss prevention (DLP MALWARE: TRENDS, DEFENCE STRATEGIES AND INCIDENT RESPONSE Malware: Trends, defence strategies and incident response planning. Threat actors have leveraged the fear and uncertainty created by the global pandemic to ramp up their social engineering and malware attacks – both of which can be hugely detrimental for organisations. Sherrod DeGrippo, Senior Director, Threat Research and Detection THE BASICS OF BACKUP: HOW TO AVOID DISASTER The basics of backup: How to avoid disaster. As the amount of data in existence surges, business leaders must ensure they have the correct processes in place to manage it and avoid data loss. A number of industry experts offer their best practice advice on the methods used to prevent data loss and how to make the most of backup strategies. VMWARE REPORT REVEALS SURGE IN CYBERATTACKS TARGETING THE VMware’s 2021 Australia Security Insights Report reveals the Australian manufacturing sector has been hit hardest by cyberattacks followed by financial services. VMware has released the findings from the fourth instalment of the Australian Security Insights Report, based on an online survey of 251 CIOs, CTOs and CISOs in December 2020in Australia.
NHS DIGITAL DEFENDS ITS PLANS TO SHARE PATIENT DATA WITH 1 day ago · NHS Digital has defended wide-spread criticism about its plans to share patient data with third-parties. Fears grew around the confidentiality of patient data, but the organisation pointed out that patients can opt-out of the process. An NHS Digital spokesperson said: “Patient data is already used every day to plan and improve healthcare services, for research that results in better treatments NCSC WARNS OF FURTHER RANSOMWARE ATTACKS ON UK EDUCATION 1 day ago · The National Cyber Security Centre (NCSC) is responding to further ransomware attacks on the education sector by cybercriminals. The government body continues to respond to an increased number of ransomware attacks affecting education establishments in the UK, including schools, colleges and universities. On Wednesday June 2, 2021, The Skinners' Kent Academy and Skinners' Kent Primary FBI SEIZES CRIMINAL PROCEEDS FROM DARKSIDE GROUP The FBI has successfully seized criminal proceeds from the DarkSide group. The organization seized the criminal proceeds from a bitcoin wallet that DarkSide ransomware actors used to collect a cyber-ransom payment from an unnamed victim. Paul M. Abbate, FBI Deputy Director, said: “Based on our investigation into DarkSide, and incredible work with other US government partners, we HOME – INTELLIGENT CISO At least 25% of users in South Africa, Kenya and Nigeria are attacked by malware. Building a cybersecurity strategy for the long haul. Leading auto retailer selects Cohesity and Cisco for backup, restore and ransomware protection. Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO'S The priorities that should be covered in every CISO’s budget. To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities forCISOs in 2021, from
CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague RANSOMWARE: TO PAY OR NOT TO PAY? The topic of ransomware is something we'd all like to avoid thinking about but is something we undoubtedly must consider. Tamer Odeh, Regional Director at SentinelOne Middle East, explores the ethics and implications behind paying a ransom. Last year saw an escalation in the number of ransomware attacks striking organisations, with both private and public sector agencies like local KNOWBE4 LAUNCHES BROWSER PASSWORD INSPECTOR TOOL KnowBe4, a provider of one of the world’s largest security awareness training and simulated phishing platforms, recently announced it has launched a new, complimentary tool called the Browser Password Inspector to help better protect organisations from ransomware attacks, credential theft and account takeovers. The issue with saving passwords in browsers is that many users are reusing the MEGATRONIX AND TRUSTONIC PROVIDE ADVANCED IVI AND Trustonic has announced that its security platform has been chosen by Tier 1 automotive service provider, Megatronix, to secure its intelligent operating system, SmartMega OS+, which brings next-generation connected services to smart vehicles. The first vehicle model to integrate SmartMega OS+, the Hycan 007, is now on sale across China. With a predicted surge in demand for connected THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
HOME – INTELLIGENT CISO At least 25% of users in South Africa, Kenya and Nigeria are attacked by malware. Building a cybersecurity strategy for the long haul. Leading auto retailer selects Cohesity and Cisco for backup, restore and ransomware protection. Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO'S The priorities that should be covered in every CISO’s budget. To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities forCISOs in 2021, from
CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague RANSOMWARE: TO PAY OR NOT TO PAY? The topic of ransomware is something we'd all like to avoid thinking about but is something we undoubtedly must consider. Tamer Odeh, Regional Director at SentinelOne Middle East, explores the ethics and implications behind paying a ransom. Last year saw an escalation in the number of ransomware attacks striking organisations, with both private and public sector agencies like local KNOWBE4 LAUNCHES BROWSER PASSWORD INSPECTOR TOOL KnowBe4, a provider of one of the world’s largest security awareness training and simulated phishing platforms, recently announced it has launched a new, complimentary tool called the Browser Password Inspector to help better protect organisations from ransomware attacks, credential theft and account takeovers. The issue with saving passwords in browsers is that many users are reusing the MEGATRONIX AND TRUSTONIC PROVIDE ADVANCED IVI AND Trustonic has announced that its security platform has been chosen by Tier 1 automotive service provider, Megatronix, to secure its intelligent operating system, SmartMega OS+, which brings next-generation connected services to smart vehicles. The first vehicle model to integrate SmartMega OS+, the Hycan 007, is now on sale across China. With a predicted surge in demand for connected THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
NEW RESEARCH SHOWS CLOUD-NATIVE ARCHITECTURES BREAK 1 day ago · Software intelligence company, Dynatrace, has announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps and agile methodologies has broken traditional approaches to application security. As organisations shift more responsibility 'left' to developers to accelerate innovation, increasingly complex ITecosystems
PROOFPOINT LAUNCHES INDUSTRY’S FIRST CLOUD NATIVE 12 hours ago · Proofpoint, a leading cybersecurity and compliance company, has announced several people-centric innovations across its three flagship platforms: Threat Protection, Compliance, and the new Information Protection and Cloud Security. Proofpoint’s Information Protection and Cloud Security Platform is the market’s first cloud native solution that combines enterprise data loss prevention (DLP INFOBLOX REVEALS MALWARE CAMPAIGNS TRACKED IN Q1 2021 1 day ago · Craig Sanderson, Vice President of Security Products at Infoblox Security Solutions, discusses the Infoblox Q1 2021 Cyberthreat Intelligence Report and tells us: “Threat actors will both innovate, adjust and sustain proven methods as 2021 unfolds.” The Infoblox Q1 2021 Cyberthreat Intelligence Report provides original research and insight into threats we observed leading up to and THE UNIVERSITY OF ARIZONA SPEEDS UP COVID-19 VACCINE 1 day ago · When the University of Arizona (UA) was chosen as a COVID-19 vaccine point of dispensing (POD), it wanted to put in place a distribution process to get the vaccines out to as many people as possible as quickly and efficiently as possible. To do this, it turned to Genetec, a leading technology provider of unified security, public safety, operations and business VMWARE REPORT REVEALS SURGE IN CYBERATTACKS TARGETING THE 10 hours ago · VMware’s 2021 Australia Security Insights Report reveals the Australian manufacturing sector has been hit hardest by cyberattacks followed by financial services. VMware has released the findings from the fourth instalment of the Australian Security Insights Report, based on an online survey of 251 CIOs, CTOs and CISOs in December 2020 in Australia. FBI SEIZES CRIMINAL PROCEEDS FROM DARKSIDE GROUP 13 hours ago · The FBI has successfully seized criminal proceeds from the DarkSide group. The organization seized the criminal proceeds from a bitcoin wallet that DarkSide ransomware actors used to collect a cyber-ransom payment from an unnamed victim. Paul M. Abbate, FBI Deputy Director, said: “Based on our investigation into DarkSide, and incredible work with other US government partners, we WWW.INTELLIGENTCISO.COM www.intelligentciso.comMAGAZINE ARCHIVE
GET IN TOUCH. UK Head Office 63/66 Hatton Garden London, EC1N 8LE Phone: +44 (0) 20 3026 6825 CHINESE THREAT GROUP USED NEW CYBER ESPIONAGE WEAPON ON 1 day ago · Check Point Research (CPR) has identified and blocked an ongoing surveillance operation targeting a south-east Asian government. The attackers, believed to be a Chinese threat group by CPR, systematically sent weaponised documents - that impersonated other entities within the same government - to multiple members of the target government’s Ministry of Foreign Affairs. KSA TEAMS UP WITH BLACK HAT ORGANISERS TO LAUNCH WORLD 1 day ago · The Kingdom of Saudi Arabia (KSA) will make a bold entry onto the global tech stage later this year with a ground-breaking, mega cybersecurity event that will bring together the world’s best hackers and trainers in the Kingdom. The Saudi Federation of Cybersecurity, Programming and Drones (SAFCSP), which has masterminded some of the Kingdom’s most innovative high-tech bootcamps and HOME – INTELLIGENT CISO At least 25% of users in South Africa, Kenya and Nigeria are attacked by malware. Building a cybersecurity strategy for the long haul. Leading auto retailer selects Cohesity and Cisco for backup, restore and ransomware protection. Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO'S The priorities that should be covered in every CISO’s budget. To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities forCISOs in 2021, from
CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague RANSOMWARE: TO PAY OR NOT TO PAY? The topic of ransomware is something we'd all like to avoid thinking about but is something we undoubtedly must consider. Tamer Odeh, Regional Director at SentinelOne Middle East, explores the ethics and implications behind paying a ransom. Last year saw an escalation in the number of ransomware attacks striking organisations, with both private and public sector agencies like local KNOWBE4 LAUNCHES BROWSER PASSWORD INSPECTOR TOOL KnowBe4, a provider of one of the world’s largest security awareness training and simulated phishing platforms, recently announced it has launched a new, complimentary tool called the Browser Password Inspector to help better protect organisations from ransomware attacks, credential theft and account takeovers. The issue with saving passwords in browsers is that many users are reusing the MEGATRONIX AND TRUSTONIC PROVIDE ADVANCED IVI AND Trustonic has announced that its security platform has been chosen by Tier 1 automotive service provider, Megatronix, to secure its intelligent operating system, SmartMega OS+, which brings next-generation connected services to smart vehicles. The first vehicle model to integrate SmartMega OS+, the Hycan 007, is now on sale across China. With a predicted surge in demand for connected THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
HOME – INTELLIGENT CISO At least 25% of users in South Africa, Kenya and Nigeria are attacked by malware. Building a cybersecurity strategy for the long haul. Leading auto retailer selects Cohesity and Cisco for backup, restore and ransomware protection. Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO'S The priorities that should be covered in every CISO’s budget. To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities forCISOs in 2021, from
CYBERCRIMINAL GANG HIT COLONIAL PIPELINE WITH RANSOMWARE Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack resulting in the US government issuing emergency legislation. Colonial Pipeline, the largest fuel pipeline in the US, has been hit by a ransomware attack. The company was knocked offline on Friday by the activities of a cybercriminal gang with the result that the US Government issued VERKADA IS VICTIM OF SECURITY CAMERA HACK Security company Verkada is reported to have been the victim of a hack of up to 150,000 security cameras. The attack targeted a Jenkins server used by its support team to perform bulk maintenance operations on customer cameras, such as adjusting camera image settings upon customer request. The attackers gained access to this server on March 7, 2021 and maintained access USING AUTOMATION TO OVERCOME THE THORNY PROBLEM OF DATA Automated and data-driven insights can be key to a CISO's business approach and to forming an effective cybersecurity strategy. Charaka Goonatilake, CTO, Panaseer, explains why data insights set CISOs free to set tailored strategies more closely aligned to the business outcomes dictated by senior management teams. If Tim Berners-Lee had given up when his boss wrote the words ‘vague RANSOMWARE: TO PAY OR NOT TO PAY? The topic of ransomware is something we'd all like to avoid thinking about but is something we undoubtedly must consider. Tamer Odeh, Regional Director at SentinelOne Middle East, explores the ethics and implications behind paying a ransom. Last year saw an escalation in the number of ransomware attacks striking organisations, with both private and public sector agencies like local KNOWBE4 LAUNCHES BROWSER PASSWORD INSPECTOR TOOL KnowBe4, a provider of one of the world’s largest security awareness training and simulated phishing platforms, recently announced it has launched a new, complimentary tool called the Browser Password Inspector to help better protect organisations from ransomware attacks, credential theft and account takeovers. The issue with saving passwords in browsers is that many users are reusing the MEGATRONIX AND TRUSTONIC PROVIDE ADVANCED IVI AND Trustonic has announced that its security platform has been chosen by Tier 1 automotive service provider, Megatronix, to secure its intelligent operating system, SmartMega OS+, which brings next-generation connected services to smart vehicles. The first vehicle model to integrate SmartMega OS+, the Hycan 007, is now on sale across China. With a predicted surge in demand for connected THE COMPROMISE AND MISUSE OF PRIVILEGED IDENTITY As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious THE CYBER KILL CHAIN: MOVING LATERALLY IN ACTIVE DIRECTORY Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers. This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed. At this phase, they are actively trying to jump from onemachine
NEW RESEARCH SHOWS CLOUD-NATIVE ARCHITECTURES BREAK 1 day ago · Software intelligence company, Dynatrace, has announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps and agile methodologies has broken traditional approaches to application security. As organisations shift more responsibility 'left' to developers to accelerate innovation, increasingly complex ITecosystems
PROOFPOINT LAUNCHES INDUSTRY’S FIRST CLOUD NATIVE 6 hours ago · Proofpoint, a leading cybersecurity and compliance company, has announced several people-centric innovations across its three flagship platforms: Threat Protection, Compliance, and the new Information Protection and Cloud Security. Proofpoint’s Information Protection and Cloud Security Platform is the market’s first cloud native solution that combines enterprise data loss prevention (DLP INFOBLOX REVEALS MALWARE CAMPAIGNS TRACKED IN Q1 2021 1 day ago · Craig Sanderson, Vice President of Security Products at Infoblox Security Solutions, discusses the Infoblox Q1 2021 Cyberthreat Intelligence Report and tells us: “Threat actors will both innovate, adjust and sustain proven methods as 2021 unfolds.” The Infoblox Q1 2021 Cyberthreat Intelligence Report provides original research and insight into threats we observed leading up to and THE UNIVERSITY OF ARIZONA SPEEDS UP COVID-19 VACCINE 1 day ago · When the University of Arizona (UA) was chosen as a COVID-19 vaccine point of dispensing (POD), it wanted to put in place a distribution process to get the vaccines out to as many people as possible as quickly and efficiently as possible. To do this, it turned to Genetec, a leading technology provider of unified security, public safety, operations and business VMWARE REPORT REVEALS SURGE IN CYBERATTACKS TARGETING THE 4 hours ago · VMware’s 2021 Australia Security Insights Report reveals the Australian manufacturing sector has been hit hardest by cyberattacks followed by financial services. VMware has released the findings from the fourth instalment of the Australian Security Insights Report, based on an online survey of 251 CIOs, CTOs and CISOs in December 2020 in Australia. FBI SEIZES CRIMINAL PROCEEDS FROM DARKSIDE GROUP 6 hours ago · The FBI has successfully seized criminal proceeds from the DarkSide group. The organization seized the criminal proceeds from a bitcoin wallet that DarkSide ransomware actors used to collect a cyber-ransom payment from an unnamed victim. Paul M. Abbate, FBI Deputy Director, said: “Based on our investigation into DarkSide, and incredible work with other US government partners, we WWW.INTELLIGENTCISO.COM www.intelligentciso.comMAGAZINE ARCHIVE
GET IN TOUCH. UK Head Office 63/66 Hatton Garden London, EC1N 8LE Phone: +44 (0) 20 3026 6825 CHINESE THREAT GROUP USED NEW CYBER ESPIONAGE WEAPON ON 1 day ago · Check Point Research (CPR) has identified and blocked an ongoing surveillance operation targeting a south-east Asian government. The attackers, believed to be a Chinese threat group by CPR, systematically sent weaponised documents - that impersonated other entities within the same government - to multiple members of the target government’s Ministry of Foreign Affairs. KSA TEAMS UP WITH BLACK HAT ORGANISERS TO LAUNCH WORLD 1 day ago · The Kingdom of Saudi Arabia (KSA) will make a bold entry onto the global tech stage later this year with a ground-breaking, mega cybersecurity event that will bring together the world’s best hackers and trainers in the Kingdom. The Saudi Federation of Cybersecurity, Programming and Drones (SAFCSP), which has masterminded some of the Kingdom’s most innovative high-tech bootcamps andSkip to content
Intelligent CISO
Covering Security Across Borders__
* Home
* Regions
* Africa
* Europe
* Middle East
* Technology
* Network
* Physical
* Data
* Analysis
* Blogs
* Insights
* Case Studies
* Videos
* Podcasts
* Content Hubs
* Forescout
* Whitepapers
* Contact Us
* Other Sites
* Intelligent CIO
* Intelligent Data Centres * Intelligent Tech ChannelsSearch for:
__ __
LATEST NEWS
MIHIR SHAH, CEO, STORCENTRIC DON BOXLEY, CHIEF EXECUTIVE OFFICER AND CO-FOUNDER, DH2I PROTECTING YOUR DATA WITH A COMPREHENSIVE SOLUTION THALES AND ATOS CREATE A SOVEREIGN BIG DATA AND ARTIFICIAL INTELLIGENCE PLATFORM INFOSECURITY EUROPE POLL REVEALS IT PROFESSIONALS ‘VERY CONCERNED’ ABOUT SUPPLY CHAIN SECURITY RISK PROTECTING YOUR DATA WITH A COMPREHENSIVE SOLUTION THALES AND ATOS CREATE A SOVEREIGN BIG DATA AND ARTIFICIAL INTELLIGENCE PLATFORM INFOSECURITY EUROPE POLL REVEALS IT PROFESSIONALS ‘VERY CONCERNED’ ABOUT SUPPLY CHAIN SECURITY RISK PROTECTING YOUR DATA WITH A COMPREHENSIVE SOLUTION THALES AND ATOS CREATE A SOVEREIGN BIG DATA AND ARTIFICIAL INTELLIGENCE PLATFORM INFOSECURITY EUROPE POLL REVEALS IT PROFESSIONALS ‘VERY CONCERNED’ ABOUT SUPPLY CHAIN SECURITY RISK WHY ‘CASTLE-AND-MOAT’ PROTECTION IS NO FAIRY TALE*
*
*
*
Intelligent Video Conferencing Partner Global ICIO Knowledge Partner Global Innovation Partner Intelligence Application Security Partner Intelligence Partner Intelligence Partner Security Intelligence Partner Intelligent Endpoint Security Partner Intelligent Education PartnerIntelligent Partner
Intelligent Endpoint Security PartnerIntelligent Partner
Intelligent Email Protection Partner Intelligent Ecommerce PartnerIntelligent Partner
Intelligent Partner
Intelligent Partner
MORE NEWS
1st June 2021
TALEND ACHIEVES ISO CERTIFICATION FOR INFORMATION SECURITY AND DATAPRIVACY
26th May 2021
MORE THAN HALF OF US COMPANIES HIT WITH PRIVILEGED CREDENTIAL THEFTAND INSIDER THREATS
25th May 2021
BARRACUDA LAUNCHES PLATFORM TO DEFEND WEB APPS FROM EVOLVING ATTACKVECTORS
18th May 2021
67% OF ENTERPRISE ENVIRONMENTS STILL RUN PROTOCOL EXPLOITED BY WANNACRY AND NOTPETYA17th May 2021
TIME TO DITCH OUR P&L MINDSET AS WE RETHINK BUSINESS AND THE ECONOMY17th May 2021
SEAMLESS INTELLIGENCE APPOINTED FIRST AUSTRALIAN-BASED LOGRHYTHM AUTHORIZED TRAINING CENTER12th May 2021
A PERFECT STORM FOR SUPPLY CHAIN ATTACKS11th May 2021
DEEP DIVE: TERRY GREER-KING, VP EMEA, SONICWALL10th May 2021
(ISC)² AND UNIVERSITY OF MARY WASHINGTON DELIVERS REGIONAL CYBERSECURITY PROGRAM30th April 2021
DEEP DIVE – ARIE DE GROOT, SENIOR DIRECTOR, MIDDLE EAST, NETSKOPEEVENTS
*
Tue
08
Jun
2021
Thu
10
Jun
2021
INFOSECURITY EUROPE
Olympia, London
Find out more.
*
Mon
18
Oct
2021
INTELLIGENT ICT AWARDS 2021TBC
More details
*
Sun
14
Nov
2021
Thu
18
Nov
2021
DUBAI AIRSHOW
DWC, Dubai Airshow SiteFind out more.
*
Sun
28
Nov
2021
@HACK
INSIGHTS
WHY ‘CASTLE-AND-MOAT’ PROTECTION IS NO FAIRY TALE Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should... EXPERTS DISCUSS WHETHER PASSWORDS ARE STILL FIT FOR PURPOSE Cybersecurity professionals discuss how far we can rely on the use of passwords to secure our most valuable information, and how... THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO’S BUDGET To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and... CIOS ARE RESPONSIBLE FOR PROMOTING INNOVATIONS THAT SUPPORT THEIRREMOTE WORKFORCE
As the world becomes more hybrid and people adapt to working remotely, CIOs must be aware of how to mitigate the expanding threat...*
*
*
*
VIDEOS
DEEP DIVE: TERRY GREER-KING, VP EMEA, SONICWALL In this edition of our Deep Dive series, Terry Greer-King, VP EMEA, SonicWall, highlights SonicWall’s... DEEP DIVE – ARIE DE GROOT, SENIOR DIRECTOR, MIDDLE EAST, NETSKOPE DEEP DIVE – SPENCER LICHTENSTEIN, PRODUCT STRATEGIST, RSA SECURITYNETWORK
DEEP DIVE – SPENCER LICHTENSTEIN, PRODUCT STRATEGIST, RSA SECURITY REINVENTING SECURITY POSTURES IN THE COVID WORK FROM HOME ERA FIREEYE INTRODUCES MANDIANT SOLUTIONS FOR SECURITY TEAMSPHYSICAL
MOTOROLA SOLUTIONS OPENS NEW FACILITY IN TEXAS, MANUFACTURING NDAA-COMPLIANT VIDEO SECURITY SOLUTIONS GENETEC LANDS MULTI-YEAR CHANGI AIRPORT GROUP SECURITY UPGRADE PROJECT MOBOTIX LAUNCHES NEW VIDEO MANAGEMENT SYSTEM IN COOPERATION WITHMILESTONE
DATA
LEADING AUTO RETAILER SELECTS COHESITY AND CISCO FOR BACKUP, RESTORE AND RANSOMWARE PROTECTION ADDING A HUMAN LAYER TO DATA SECURITY IN GOVERNMENT ORGANISATIONS NEW CROWDSTRIKE REPORT REVEALS MORE CYBERATTACKS IN THE FIRST HALF OF2020 THAN 2019
*
*
*
THOUGHT LEADERSHIP
WHY ‘CASTLE-AND-MOAT’ PROTECTION IS NO FAIRY TALE Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why... FORTINET EXPERT ON THE THREATS IMPACTING EDUCATION CYBERSECURITY The threat landscape is continuously evolving with the adoption of innovative technology to meet vast demands. This... SECURING THE CLOUD: WHY SPEED IS OF THE ESSENCE Organisations across the Middle East are increasingly adopting cloud applications and platforms. Given the remote... EXPERTS DISCUSS WHETHER PASSWORDS ARE STILL FIT FOR PURPOSE Cybersecurity professionals discuss how far we can rely on the use of passwords to secure our most valuable... THE PRIORITIES THAT SHOULD BE COVERED IN EVERY CISO’S BUDGET To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for...LATEST WHITEPAPERS
Cribl
2021 Observability
Predictions Paper
Download
__
Datadog
Datadog Solution Brief Monitoring ConsolidationDownload
__
Epicor
Push Past These Common Manufacturing ChallengesDownload
__
Citrix
The Present and the Future of Higher Education ITDownload
__
Fortinet
10 Questions To Ask Before Making a Security InvestmentDownload
__
PluralSight
How mature is
your cloud?
Download
__
Schneider Electric
Modernize and upgrade your legacy data centerDownload
__
Splunk
The Data Age Is Here.Are You Ready?
Download
__
Stealthbits
Credential and Data SecurityAssessment Brief
Download
__
Genesys
Busting the Top
10 Myths
Download
__
Verizon
Meet the Complete
Business Bundle
Download
__
VMware
The Economics of Cloud Optionsin Higher Education
Download
__
*
*
*
*
WHITEPAPERS
Cribl
2021 Observability
Predictions Paper
Download
__
Datadog
Datadog Solution Brief Monitoring ConsolidationDownload
__
Epicor
Push Past These Common Manufacturing ChallengesDownload
__
RESEARCH
VOICE OF THE CISO 2021 REPORT: UAE CISOS FEEL UNPREPARED TO COPE WITHA CYBERATTACK
Proofpoint, a cybersecurity and compliance company, has released its inaugural 2021 Voice of the CISO report which explores key... GENETEC EMEA SHARES NEW RESEARCH INTO THE STATE OF PHYSICAL SECURITY2021
Insights from over 1,500 physical security leaders highlight cybersecurity as a strategic priority and accelerating adoption ofcloud...
TREND MICRO BLOCKED MORE THAN 32 MILLION THREATS IN UAE IN 2020 Cybersecurity vendor Trend Micro, recently released its 2020 annual cybersecurity report: A Constant State of Flux and shared insights... MULTIPLE WEB APP SECURITY ISSUES FOUND IN ALL TOP 10 US CREDIT UNIONS Financial services are big targets for cybercrime and with the average cost of a US data breach at US$8.64 million, it’s a...*
*
*
*
LATEST THREATS
FBI RECEIVES RECORD-LEVEL OF COMPLAINTS FOR ONLINE SCAMS The FBI says that complaints concerning online scams and investment fraud have now reached a record-breaking level. The FBI’s Internet Crime Complaint Center (IC3) received its 6 millionth complaint on May 15, 2021. While it took close to seven years for the IC3 to registerits first one...
BOSE CORPORATION CONFIRMS DATA BREACH FOLLOWING RANSOMWARE ATTACK Bose Corporation (Bose) has disclosed a data breach following a ransomware attack that hit the company’s systems in early March. In a breach notification letter filed with New Hampshire’s Office of the Attorney General, the consumer electronics company said that it‘experienced...
BRAZILIAN MALWARE ON THE RISE: KASPERSKY DISCOVERS NEW LOCAL BANKING TROJAN IS GOING GLOBAL Kaspersky researchers have discovered a new banking malware from Brazil, named Bizarro, targeting 70 banks from different European and South American countries. Last year, Kaspersky researchers saw several banking trojans from South America (Guildma, Javali, Melcoz and Grandoreiro), expanding...CASE STUDIES
AKUBRA UPGRADES SECURITY AND PROTECTS AGAINST MALICIOUS ATTACKS WITHWATCHGUARD
LEADING AUTO RETAILER SELECTS COHESITY AND CISCO FOR BACKUP, RESTORE AND RANSOMWARE PROTECTION ACHIEVING A UNIFIED APPROACH TO DEFEND AGAINST CYBERTHREATS WITH STRONG NETWORK SECURITY* Middle East
* Africa
* Europe
THE ZERO TRUST SECURITY MODEL — A MUST-HAVE FOR THE NEW NORMALHYBRID WORLD
Vibin Shaju, Presales Director, EMEA Enterprise, McAfee, tells us how a Zero Trust model can create a strong foundation for holistic security and why it is required, particularly as the Coronavirus pandemic caused a surge in the number of data breaches. Prior to the emergence of the COVID-19 pandemic, the business case for cloudcomputing
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING – THE DIGITAL SENTINELS IN-PERSON GISEC 2021 TO SPARK INDUSTRY COLLABORATION AGAINSTCYBERCRIME SPIKE
STRATEGIES TO ENSURE CYBERSECURITY ALIGNS WITH 2021 BUSINESSOBJECTIVES
The remote working model has meant more organisations have had to adapt to a hybrid workforce and creating a culture of security while building an updated cybersecurity strategy is critical. Alain Sanchez, EMEA CISO and Senior Evangelist at Fortinet, discusses some key ways to build out a robust cybersecurity plan for a hybrid workforce. Every AT LEAST 25% OF USERS IN SOUTH AFRICA, KENYA AND NIGERIA ARE ATTACKEDBY MALWARE
BUILDING A CYBERSECURITY STRATEGY FOR THE LONG HAUL LEADING AUTO RETAILER SELECTS COHESITY AND CISCO FOR BACKUP, RESTORE AND RANSOMWARE PROTECTION Arnold Clark needed sufficient protection against ransomware attacks, and Cohesity and Cisco’s technology offering helped the automotive company to address this. Pat Malloy, Head of Networks and Platform Engineering, Arnold Clark, tells us how the Cohesity-Cisco solution provided the customer with a simplified, modern backup and recovery solution, which is integral in the transport industry UK AND US CALL OUT RUSSIA FOR SOLARWINDS COMPROMISE UNIVERSITY OF HERTFORDSHIRE HIT BY CYBERATTACK IMPACTING ALL SYSTEMSINFOGRAPHICS
BUSINESSES FALL SHORT OF CONSUMER EXPECTATIONS FOR LOGIN EXPERIENCES A survey from Auth0 has revealed that APAC businesses fall short of consumer expectations for login experiences. Auth0, the modern... GENETEC EMEA SHARES NEW RESEARCH INTO THE STATE OF PHYSICAL SECURITY2021
Insights from over 1,500 physical security leaders highlight cybersecurity as a strategic priority and accelerating adoption ofcloud...
CXO RESEARCH: 58% OF DATA BACKUPS ARE FAILING, LEAVING DATAUNPROTECTED
Veeam Data Protection Report 2021 finds that COVID-19 has significantly impacted Digital Transformation (DX) spending, with 40%of global...
REPORT HIGHLIGHTS KEY TRENDS IN ECRIME AND NATION-STATE ACTIVITY CrowdStrike, a leader in cloud-delivered endpoint and workload protection, today announced the release of the 2021 CrowdStrikeGlobal...
*
*
*
*
BLOGS
WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS:FIVE KEY ELEMENTS
SECURITY IS ABOUT MORE THAN THE NETWORK A PANDEMIC OF CYBERATTACKS RANSOMWARE 2020: A YEAR OF MANY CHANGES EVERY DAY IS A NEW DATA PROTECTION DAY OVERCOMING ‘WORK FROM HOME’ SECURITY CHALLENGES: SECURITY BEYONDTHE VPN
GO PHISH
GO PHISH: NICK HAYES, DIRECTOR OF CYBER SOLUTIONS, SURECLOUD We ‘Go Phishing’ with Nick Hayes, Director of Cyber Solutions, SureCloud, who tells us about life both in and outside the... GO PHISH: SAEED AHMAD, MANAGING DIRECTOR, MIDDLE EAST AND NORTHAFRICA, CALLSIGN
We ‘Go Phishing’ with Saeed Ahmad, Managing Director, Middle East and North Africa at Callsign, who tells us about life both... GO PHISH: JONATHAN FISCHBEIN, CISO, CHECK POINT SOFTWARE We ‘Go Phishing’ with Jonathan Fischbein, Check Point Software’s Chief Information Security Officer, who tells us about... INTERVIEW WITH JOANNE WONG, VICE PRESIDENT, INTERNATIONAL MARKETS,LOGRHYTHM
On International Women’s Day we talk to Joanne Wong, Vice President, International Markets, LogRhythm about the challenges and the...*
*
*
*
DEEP DIVE
DEEP DIVE – SPENCER LICHTENSTEIN, PRODUCT STRATEGIST, RSA SECURITY In this edition of our Deep Dive series, Spencer Lichtenstein, Product Strategist at RSA Security, talks us through the steps organisations must take when launching a remote SOC.... CLOSING THE SKILLS GAP: THE ART OF FINDING AND RETAINING CYBERSECURITYTALENT
The cybersecurity skills gap is not going away any time soon. Tim Bandos, CISO at Digital Guardian, explains how companies shouldn’t always rely on the same channels to look for... TAKE THE PRESSURE DOWN! FOUR WAYS TO LOWER THE STRESS LEVELS OF YOURCYBERSECURITY TEAM
A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills... IT’S BACK TO BASICS DURING CYBERSECURITY AWARENESS MONTH During Cybersecurity Awareness Month, Jonathan Couch, SVP of Strategy at ThreatQuotient, gives his top tips on how to help friends and family become more cybersecurity savvy. This month marks the... ADDING A HUMAN LAYER TO DATA SECURITY IN GOVERNMENT ORGANISATIONS There seems to be a sense that human-activated data breaches are inevitable within the public sector, meaning risk appetite is set at a level that accepts a 25% breach risk. Tony Pepper, CEO, Egress,... CYBERSECURITY IN THE COVID ERA: GUARDING AGAINST PHISHING While employees have, in the main, adapted to working from home, the rapid move to a remote workforce as a result of Coronavirus has left many organisations highly susceptible to... BITGLASS EXPERT ON NEW THREATS TO THE APAC REGION Dave Shephard, Vice President Asia Pacific and Japan, Bitglass, discusses the new cyberthreats facing the region. The major cyberthreats facing Asia Pacific today largely reflect those faced elsewhere around the...BLOGS
WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS:FIVE KEY ELEMENTS
SECURITY IS ABOUT MORE THAN THE NETWORK A PANDEMIC OF CYBERATTACKS GET INTELLIGENT CISO NEWS DELIVERED TO YOUR INBOX ABOUT INTELLIGENT CISO Intelligent CISO is a technology intelligence platform aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the global community.GET IN TOUCH
UK HEAD OFFICE
63/66 Hatton Garden
London, EC1N 8LE
Phone: +44 (0) 20 3026 6825 Copyright © 2021 Intelligent CISO | Privacy Policy| A Lynchpin Media
Brand
__ __
Browse our latest issue View Magazine Archive×
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0