Steve Rivers, International Technical Director, ThreatQuotient, discusses how government organisations can strengthen their cyber defences with the right tools and threat intelligence.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 477Saudi Arabian firms witnessed dramatic rise in business-impacting cyber-attacks: report
Saudi Arabian organisations (95 percent) have experienced a business-impacting cyberattack in the past 12 months, according to a global industry study that published by Cyber Exposure company Tenable.
SentinelOne uncovers IoT vulnerabilities enabling remote takeover and network intrusion
SentinelOne, the autonomous cybersecurity platform company, has announced that Barak Sternberg, SentinelLabs security researcher, has identified four unique vulnerabilities in HDL Automation smart devices.
Mimecast redefines phish testing and training with SAFE Phish
Mimecast has announced an industry changing capability that will allow customers to launch live phishing simulations.
Qualys strengthens security and threat research offerings with latest acquisition
Qualys has announced that it has acquired the software assets of Spell Security, an endpoint detection and response start-up.
How Cyware and Exclusive Networks help enterprises unlock the value of threat intelligence
Ahmed Ali, VP of Sales for EMEA, Cyware, sheds light on how the company’s innovative offerings can enable organisations to leverage the strategic value of threat intelligence.
Rethinking endpoint security in the ‘new normal’
The sudden transition to telework has forced IT departments to rethink how to secure networks, as they implement policies and tools to protect employees working from home.
Five early warning signs organisations are about to be attacked by ransomware
When you find any of these five indicators during an investigation it is almost certain that attackers have poked around to learn how they can to launch a ransomware attack.
Crypto-ransomware in action: a closer look at the WastedLocker hijack of Garmin
Garmin was attacked by the Trojan WastedLocker—ransomware that has become noticeably more active since the first half of this year.
Pulse Secure delivers new cloud-based, Zero Trust service for multi-cloud secure access
Pulse Secure has launched Pulse Zero Trust Access (PZTA), a cloud-based, multi-tenant secure access service that enables organisations to provide users easy, anywhere access to multi-cloud and data centre applications with Zero Trust assurance.