Top Stories

Internet Infrastructure Security Guidelines for Africa launched to increase...

The Internet Society and the African Union Commission have unveiled a new set of Internet Infrastructure Security Guidelines for Africa during the African Internet Summit, taking place in Nairobi 30 May – 2...

Pulse Secure improves IT security at UAE’s Tourism Development and Investment C...

A secure access solutions business has boosted the efficiency of IT operations at an UAE tourist company. Pulse Secure has improved the security of IT operations at the Tourism Development and Investment Company...

Raytheon and Saudi Arabia Military Industries sign MoU for cyber security

In a ceremony witnessed by the Custodian of the Two Holy Mosques, King Salman bin Abdulaziz Al Saud, and US President Donald Trump, Raytheon and the Saudi Arabia Military Industries Company signed a Memorandum of...

DDoS cyberattacks double due to insufficient security controls for IoT...

The number of denial-of-service (DoS) or distributed-denial-of-service (DDoS) cyberattacks doubled from 3% to 6% in 2016, due to the lack of sufficient security controls of Internet-connected Internet of things (IoT)...

Wannacry: an analysis of competing hypotheses by Digital Shadows

On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also began to worm their way through the information security community. Who was responsible for...

Mimecast to demonstrate cyber resilience techniques at GISEC 2017

Email and data security company Mimecast Limited has announced its participation at the 4th Gulf Information Security Expo and Conference (GISEC), which will be held from May 21 to May 23 at the Dubai World Trade...

Browse our latest issue

Intelligent CISO

View Magazine Archive