Blogs

‘Tis the season to do predictions: The 2018 cybersecurity landscape

Every year around this time all the security businesses and analysts leap for their crystal ball and attempt to predict what we should be worrying about in the coming 12 months or more. And the sad reality is that not...

Future-proofing organisations with zero-trust approach

Article by Mechelle Buys Du Plessis, Managing Director – UAE, Dimension Data 2018 will see a vast change in internal security procedures moving towards what is called a zero-trust security model. IT departments of o...

DDoS mitigation is the best practice in an IoT world

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this...

The shift from prevention technology to deception and response

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new...

Cybersecurity alert: should you fear the ‘Reaper’?

Article by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’, appears t...

What you can learn from recent cyber attacks targeting school systems

Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognise. The cyber thug behind the message made a myriad of t...

Browse our latest issue

Intelligent CISO

View Magazine Archive