Insights

Can you afford $500 per minute of internet downtime?

Many organisations have no clue how much one minute of internet downtime costs them, or haven’t stopped to think about it, says Tom Beinkowski, Director of Product Marketing at Arbor Networks. As a result, they greatly u...

Building a secure DNS architecture for NFV

It’s been well established that Network Functions Virtualisation (NFV) provides important benefits to service providers. Not only does it provide cost savings by reducing operational costs and truck rolls to...

Preparing for smokescreen DDoS attacks

The threat landscape is more complex than ever, and establishing a cyber-security strategy in 2016 entails accounting for a number of different factors. Hackers will employ a variety of techniques to achieve their...

An integrated approach to the security threat defence lifecycle

Attackers today use multiple techniques to penetrate an organisations’ infrastructure and compromise their vital data assets or systems. In the opinion of Raj Samani, VP and CTO at Intel Security EMEA, this problem has on...

Kaspersky Lab finds security weaknesses in Health IT

A Kaspersky Lab Global Research & Analysis Team (GReAT) expert has conducted real field research at one private clinic in an attempt to explore its security weaknesses and how to address them. Vulnerabilities were...

Preventing DNS-based data exfiltration

Theft of sensitive or regulated data and intellectual property is one of the most serious risks to an enterprise. DNS is frequently used as a pathway for data exfiltration, because it is not inspected by common...

Browse our latest issue

Intelligent CISO

View Magazine Archive