Cybersecurity

World cybersecurity leaders form Advisory Council to tackle growing...

Healthcare IoT and medical device cybersecurity specialist, Cylera, has formed its first Advisory Council bringing together World leaders in cybersecurity to share insight and drive innovation to help tackle the...

Nearly half of CISOs in the UAE experienced loss of sensitive data in the...

Proofpoint’s annual Voice of the CISO report has revealed that 75% of CISOs in the UAE believe employees leaving the organisation contributed to a data loss incident, a...

IRONSCALES reveals new insights on phishing and BEC threats

IRONSCALES, a leading enterprise cloud email security platform protecting more than 10,000 global enterprises, has released its inaugural IRONSCALES Threat Index.  This is based on proprietary data analysis of...

Tesserent Academy launches free ‘100 Day Challenge’ to accelerate cyb...

Tesserent Limited has launched its first Tesserent Academy ‘100 Day Challenge’. This is a free fully funded program designed to accelerate cybersecurity training for students and graduates. Tesserent...

Eleven steps to develop an effective ransomware response

Anthony Giandomenico, VP Global Security Consulting, Proactive and Reactive Services, Fortinet, and Aamir Lakhani, Global Security Strategist and Researcher, Fortinet, offer a checklist which suggests how...

What are the security implications of using ChatGPT?

Countries across the globe are wary of the potential cybersecurity implications of latest tech phenomenon that is ChatGPT. In light of recent ChatGPT concerns in the news, Richard Forrest, Legal Director at UK law...

Browse our latest issue

Intelligent CISO

View Magazine Archive