Analysis

J2 Software CEO on the importance of securing your password

J2 Software CEO John McLoughlin on how to to keep your passwords secure.   Password breaches are all too common nowadays and the biggest challenge is to keep a different complex password for every website or app....

Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of...

Cyjax to launch Middle East operations at GISEC 2019

At GISEC Cyjax will do an in-depth expose on Dark Web’s nefarious sites, geo-political drivers and criminal activities. Cyjax, a leading provider of digital threat intelligence, ransomware negotiations and incident r...

Tech support scams are a growing threat, according to Trend Micro

Hackers are always on the lookout for new ways to make more money. Cybercriminals have an impressive arsenal of tools to use in order to retrieve data or money from someone’s network. One of the methods that they are u...

How quickly could a cyberattack take down critical infrastructure?

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, Doros Hadjizenonos, Regional Sales Director at security specialist Fortinet, says stakeholders need to consider the...

CrowdStrike announces EDR solution for mobile devices

CrowdStrike, a leader in cloud-delivered endpoint protection, has announced CrowdStrike Falcon for Mobile, an enterprise endpoint detection and response (EDR) solution for mobile devices. Based on CrowdStrike’s proven E...

Browse our latest issue

Intelligent CISO

View Magazine Archive