Cybersecurity

Deep Dive: Jamil Abu Aqel, Head of Mandiant Systems Engineering for...

Cloudflare is democratising post-quantum cryptography by delivering it for...

Cloudflare announced it will provide post-quantum cryptography for free by default to all customers to help secure their websites, APIs, cloud tools and remote employees against future threats. Now, all Cloudflare...

11 steps to develop effective ransomware response

Anthony Giandomenico, VP Global Security Consulting, Proactive & Reactive Services, Fortinet, and Aamir Lakhani, Global Security Strategist and Researcher, Fortinet, offer a checklist which suggests how...

The security risks of ChatGPT: How businesses can safeguard their data

Though there are many benefits of the new phenomenon that is ChatGPT, it has also caused everyone’s exposure to cybercrime to significantly increase. Florian Malecki, Executive Vice President Marketing,...

IBM and Cohesity announce new data security and resiliency collaboration

IBM and Cohesity have announced a new collaboration to address the critical need organisations have for increased data security and resiliency in hybrid cloud environments. Combining data protection, cyber-resilience...

Akamai research shows 193 million mobile malware attacks flagged for...

Akamai Technologies has launched a new State of the Internet report on malicious Domain Name System (DNS) traffic. The report, Attack Superhighway: A Deep Dive on Malicious DNS Traffic, looks into attacks that...

Browse our latest issue

Intelligent CISO

View Magazine Archive