More News

Biometric security predictions for 2018

Can biometrics replace any existing authentication technology today? Yes, biometrics can replace existing authentication technology today but there is a lot of work to be done and additional security layers are needed...

Attivo announces validations that ‘deception’ fools attackers

Validating deception’s ability to serve as a reliable security control for closing in-network detection gaps, Attivo Networks has released results of a penetration test conducted by a top computer forensics company t...

Mimecast expert: Cybercriminals are setting sights on healthcare

Cybercriminals have set their sights on protected health information. It’s Black Market value is greater than credit card information. By Brandon Bekker, Managing Director at Mimecast, Africa and the Middle East, e...

Orchestrating secure access in a multi-cloud IT environment

Article by: Rob Koeten, Chief Software Architect, Pulse Secure Driven by multiple technology, market and social trends, the world of application and cloud information access is evolving and expanding rapidly. Simply...

Mobile Malware: Introducing a new era of cyber threats

Malware is a word that strikes fear into the hearts of users of digital devices. Many of us associate it with attacks on networks or individual computers. It’s easy to forget that mobiles can also come under attack f...

eHDF achieves accreditation for Dubai cyber defence centre

eHosting DataFort (eHDF), a leading cloud infrastructure, managed hosting and security services provider, has announced the certificate of achievement (CREST Maturity Model) for its Cyber Defence Centre (CDC)/ Security...

Browse our latest issue

Intelligent CISO

View Magazine Archive