More News

Bad patch management keeps old exploits en vogue

As much as cybercriminals continue to refine and expand their ways of attacking data and devices, they are also digging into their bags of tried and trusted tricks. Richard Broeke, an IT security specialist and...

DDoS mitigation is the best practice in an IoT world

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this...

The shift from prevention technology to deception and response

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new...

Remotely protect and control your data with Seclore 3.0

Seclore is one of the pioneers in the EDRM (Enterprise Digital Rights Management) space. The company has recently launched their new product version, Seclore 3.0. Intelligent CIO caught up with Rohit Oberoi, Director...

Threat actors could use third-party software to gain entry into enterprise

In the coming year, the world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and...

Cybersecurity alert: should you fear the ‘Reaper’?

Article by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’,...

Browse our latest issue

Intelligent CISO

View Magazine Archive