Analysis

Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text...

Cybersecurity is new source of ‘competitive advantage’ for retailers

Cybersecurity is a new source of competitive advantage for retailers. That’s according to a report by Capgemini‘s Digital Transformation Institute, which has called for more organisations to align...

New security centre marches ahead in fight against cybercrime

A joint venture between the University of Wolverhampton and Herefordshire Council has secured £9 million funding to develop a new Centre for Cyber Security in Hereford. The University of Wolverhampton has...

Rushed blockchain projects putting organisations at risk

Globally, businesses are expected to invest US$3.1 billion in blockchain solutions in 2018, more than double the figure from the previous year. If these predictions are correct, RSA warns that security teams...

Post-WannaCry state of healthcare data management in Middle East

By Gregg Petersen, Regional Vice President, Middle East and Africa at Veeam Software Over a year ago, the seismic impact of the WannaCry ransomware attack made headlines around the world. Affecting more than 300,000...

Endpoint security automation a top priority for IT professionals

Global cybersecurity training company, the SANS Institute, has released its 2018 SANS Endpoint Security Survey report, which found that automating endpoint detection and response processes is the top priority for IT...

Browse our latest issue

Intelligent CISO

View Magazine Archive