Intelligent CIO Logo

Intelligent Enterprise Security

Fake news ‘as a Service’ on the rise according to Digital Shadows

Thumbnail

New research indicates that criminals are increasingly exploiting the growth of ‘fake news’ for commercial gain. The growth of so-called fake news has traditionally been associated with the political sphere and executed for ideological purposes. However, research conducted by analysts at Digital Shadows reveals the growth of toolkits and services – available for just $7 […]


Bad patch management keeps old exploits en vogue

Thumbnail

As much as cybercriminals continue to refine and expand their ways of attacking data and devices, they are also digging into their bags of tried and trusted tricks. Richard Broeke, an IT security specialist and General Manager at leading managed IT security provider, Securicom, says that there’s a growing number of companies experiencing exploits on […]


DDoS mitigation is the best practice in an IoT world

Thumbnail

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this brand-new world of science fiction coming to life, threats lurk also. So says Arbor Network’s […]


The shift from prevention technology to deception and response

Thumbnail

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new technologies such as IoT changing the threat landscape. Q: Since the product launch in June this year, has Attivo made any adaptations to […]


Threat actors could use third party software to gain entry into enterprises

Thumbnail

In the coming year, the world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and mitigate, according to Kaspersky Lab’s Targeted Threat Predictions for 2018. Other hard-to-block attacks, such as those involving high-end mobile malware are […]


Cybersecurity alert: should you fear the ‘Reaper’?

Thumbnail

Article by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’, appears to be a more powerful strain of Internet of Things (IoT) attack malware than Mirai, the previous holder of the IoT botnet crown. And while Reaper hasn’t […]


Fujitsu safeguards organisations with Cyber Threat Intelligence service

Thumbnail

Intended to safeguard companies from cyberattacks that could have a catastrophic effect on business continuity, Fujitsu has announced the availability of its Cyber Threat Intelligence (CTI) service in Europe, the Middle East, India and Africa (EMEIA). The service ensures that customers can properly defend themselves against cyberattacks, which have the potential to put a company […]


10 steps to stop lateral movement in data breaches

Thumbnail

Article by Brad Hibbert, Lead Solutions Strategist at BeyondTrust As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related breaches leveraged either stolen and/or weak passwords. While the specific tactics may vary, the stages of an outsider attack are similar and […]


SophosLabs Malware Forecast: no platform immune from ransomware

Thumbnail

Sophos, a global leader in network and endpoint security, has announced its SophosLabs 2018 Malware Forecast, a report that recaps ransomware and other cybersecurity trends based on data collected from Sophos customer computers worldwide during 1 April to 3 Oct, 2017. One key finding shows that while ransomware predominately attacked Windows systems in the last […]


New Nokia security software helps combat growing ransomware threat

Thumbnail

Nokia has announced its next-generation NetGuard Security Management Center software, designed to bolster service providers’ ability to proactively detect, predict and combat the growing threat from ransomware and other types of malware. The volume, velocity and variety of security data today is overwhelming security teams. Companies typically receive hundreds of thousands of security alerts per […]


Encryption: the beer goggles of business today

Thumbnail

Encryption has become key to protecting the privacy of electronic communication – and for certain transactions, encryption is a legal requirement – but it’s a bit like beer goggles; it makes everything look a lot rosier than it is. With between 50% and 70% of online traffic now encrypted, it is safe to say that […]


Preparation is key when defending against DDoS attacks

Thumbnail

Article by Bryan Hamman, Arbor Networks, Territory Manager for sub-Saharan Africa If you are well prepared with your security systems – deployed in a holistic manner – you can prevent generic threats from getting into your environment. With the right tools, processes and people, you can detect and contain more advanced threats before they have […]


Infoblox partners with McAfee for unified network security

Thumbnail

Infoblox Inc., the network control company that provides Actionable Network Intelligence, has announced it is partnering with McAfee to improve the security of a customer’s network by combining the power of Web and domain name system (DNS) security to deliver unified security. The Infoblox and McAfee solution enables sharing of threat intelligence and security event […]


Key considerations when using a web application firewall

Thumbnail

Cybersecurity specialists are realising more and more the growing danger of application layer threats to a network. While there is no denying the need to remain aware of distributed denial of service (DDoS) attacks, application layer attacks are very difficult to detect and provide little or no advanced warning before attacking your applications. This is […]


Sophos launches Sophos XG Firewall with Synchronized App Control

Thumbnail

Sophos, a global leader in network and endpoint security, has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in network traffic visibility. Using Synchronized Security to obtain information from the endpoint, XG Firewall can identify, classify and allow the control of all previously unknown applications active on the network, […]


IoT offers benefit – but what about security?

Thumbnail

There is no question that the Internet of Things (IoT) has revolutionised commerce, providing service providers with a direct, vibrant and immediate channel of interaction with customers – and immediate gratification for consumers! However, the Internet is under threat from evolving cyberthreats and IoT security is of growing concern to the market. This is according […]


15 tips to staying secure while staying connected

Thumbnail

Article by Chris Bullock, Managing Principal at SecureWorks Cruising the Internet can be harmful if you don’t follow best security practices. The good news is you don’t need to be a cybersecurity pro to employ smart online safety habits that can go a long way in guarding against online crime. Cybersecurity best practices make up […]


XON and NEC Africa to launch Africa’s physical and cyber defence centre

Thumbnail

XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC) on 6 November. The centre will be the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services, with all the underlying IT infrastructure necessary for a turnkey solution. The launch will be to […]


CA Southern Africa and Veracode enable secure software development

Thumbnail

CA Southern Africa has announced that the completion of CA Technologies acquisition of Veracode, a leader in securing web, mobile and third party applications across the software development life cycle, has added to its growing security and DevOps portfolio, making them a leader in DevSecOps. The combination of CA’s portfolio with Veracode will establish CA […]


McAfee announces new endpoint and cloud innovations

Thumbnail

McAfee, one of the world’s leading cybersecurity companies, has announced new endpoint and cloud solutions that go beyond machine learning to take advantage of the speed and accuracy of advanced analytics, deep learning and artificial intelligence, and increase efficiency of security operations. Cyberthreats and the data needed to defend against them continue to increase, overwhelming […]