Europe

Key Reinstallation Attacks (KRACK): The impact so far

A series of high-severity vulnerabilities affecting the Wi-Fi Protected Access II (WPA2) protocol were disclosed. Security researchers have developed a proof of concept (POC) demonstration, dubbed “KRACK”,...

Emerging technologies help revolutionise public sector agencies

Advanced analytics and other emerging technologies are revolutionising the way governments and public service agencies are trying to address citizen demands, helping to overcome persistent challenges such as...

The 5 most common router attacks on a network

Unfortunately, router attacks cannot be 100 percent prevented, but there are a few things that you can be doing to prevent one of the most common router attacks from occurring on your system and network. Large...

Digital trust in the IoT era

As we use more and more connected devices and more and more of our day is filled with digital experiences, both personally and professionally, Digital Trust becomes key. This is due to so much data being created by...

Telefónica integrates digital signature solution with Microsoft Azure

Telefónica celebrates its 5th Security Innovation Day, an event of national and international note about innovation and security. Pedro Pablo Pérez, CEO of ElevenPaths, Telefónica’s cybersecurity unit, shared his vision and ...

Napatech and Credocom create joint solution for Palo Alto firewalls

Napatech announced today a joint solution with Credocom that uses Napatech’s Pandion network recorder to enable customers who use Palo Alto Networks’ firewall to see detailed information on security...

Browse our latest issue

Intelligent CISO

View Magazine Archive