Insights

ESET trends for 2017: Holding security ransom

ESET has released a report with eight researchers examining the speed at which new technologies emerge and attack surfaces widen. In this context, ESET considers where security risks will migrate and what companies,...

SSL inspection – Uncovering cyber threats in SSL traffic

Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration – as encryption i...

12 security defence precautions over the festive season

For many, Christmas is the most wonderful time of the year – but find oneself a victim of an online attack and the season may turn sour. With spirits and Internet usage at an all-time high there’s no better time to lure a vic...

Cyber attacks just got that little bit more personal…

2016 saw a huge number and variety of cyber attacks, ranging from a high-profile DDoS using hijacked Internet-facing security cameras to the alleged hacking of party officials during the US election. We also saw a...

Security concerns over convergence of personal and workplace identities

Gemalto has released the findings of its Authentication and Identity Management Index, which revealed that 92% of enterprise IT professionals surveyed in the Middle East are concerned that employee reuse of personal...

Upstream providers will become targets in 2017, says A10

The cyber landscape changes dramatically year after year. If you blink, you may miss something; whether that’s a noteworthy hack, a new attack vector or new solutions to protect your business. Sound cyber security m...

Browse our latest issue

Intelligent CISO

View Magazine Archive