Insights

Understanding the common motives behind DDoS cyber attacks

Distributed denial-of-service (DDoS) attacks continue to be one of the most prevalent methods hackers use to disrupt businesses. Involving the use of multiple systems (personal computers, smartphones, etc.), DDoS...

Can you afford $500 per minute of internet downtime?

Many organisations have no clue how much one minute of internet downtime costs them, or haven’t stopped to think about it, says Tom Beinkowski, Director of Product Marketing at Arbor Networks. As a result, they...

Building a secure DNS architecture for NFV

It’s been well established that Network Functions Virtualisation (NFV) provides important benefits to service providers. Not only does it provide cost savings by reducing operational costs and truck rolls to...

Preparing for smokescreen DDoS attacks

The threat landscape is more complex than ever, and establishing a cyber-security strategy in 2016 entails accounting for a number of different factors. Hackers will employ a variety of techniques to achieve their...

An integrated approach to the security threat defence lifecycle

Attackers today use multiple techniques to penetrate an organisations’ infrastructure and compromise their vital data assets or systems. In the opinion of Raj Samani, VP and CTO at Intel Security EMEA, this...

Kaspersky Lab finds security weaknesses in Health IT

A Kaspersky Lab Global Research & Analysis Team (GReAT) expert has conducted real field research at one private clinic in an attempt to explore its security weaknesses and how to address them. Vulnerabilities were...

Browse our latest issue

Intelligent CISO

View Magazine Archive