Magazine Button


The CISO Challenge: Managing Threats with Limited Resources

Learn more about the key findings of Making Tough Choices: How CISOs Manage Escalating Threats and Limited Resources, a report conducted by Fortinet and Forbes Insights.#

Cyber adversaries up the ante on evasion and anti-analysis to avoid detection

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their […]

edgescan research reveals time spent validating false positives

edgescan, a leading provider of fullstack vulnerability management, has discovered that more than 60% of security professionals estimate their security function spends over three hours per day validating false positives. The recent survey of IT security experts also revealed that nearly 30% of respondents are in fact spending more than six hours per day on […]

Lack of collaboration between C-suite and IT teams holds back Digital Transformation

According to NTT Ltd.’s 2019 Digital Means Business Report, only 11% of organisations are highly satisfied with those in charge of spearheading Digital Transformation, despite the fact that almost three-quarters of them are already underway on their journey. Organisations worldwide are achieving some success with Digital Transformation, but there’s still a strong belief that this […]

New Mimecast report reveals analysis of 67 billion rejected emails

Mimecast Limited, a leading email and data security company, has launched its first Threat Intelligence Report: Black Hat Edition 2019. The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers. Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active […]

Research reveals criminals’ most effective weapon in ransomware attacks

Vectra, a leader in network threat detection and response (NDR), has disclosed that cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in Infrastructure-as-a-Service (IaaS) cloud providers.  Attackers can easily evade network perimeter security and perform internal reconnaissance […]

New research reveals key capabilities of high performing CIOs

A study from ServiceNow shows building C-suite influence, focusing on customers and digital workflow maturity will unlock success. Top-performing CIOs are focusing more on business leadership and the goals of the customers, employees, and other business functions, rather than technology operations, according to new research from ServiceNow. The global survey of 516 CIOs, conducted by […]

Industry expert on building the foundations to support every cybersecurity strategy

The Minimum Cyber Security Standard defines the minimum security measures organisations and agencies must implement. But while awareness of this standard is high (98%), organisations have not seen the dip in cyberattacks that you would expect, as more had experienced over 1,000 attacks in 2018 than in 2017, according to the findings of an FOI […]

UK students at risk of email fraud ahead of A-level results day

Proofpoint, a leading cybersecurity and compliance company, has released research identifying that almost two thirds (65%) of the UK’s top 20 universities have no published DMARC (Domain-based Message Authentication, Reporting and Conformance) record, making them potentially more susceptible to cybercriminals spoofing their identity and increasing the risk of email fraud for students. With a record 40% […]

Securing DevOps: Why culture is key to driving company-wide success

Bharat Mistry, Principal Security Strategist at Trend Micro, explores the key challenges when it comes to implementing DevOps initiatives from a security standpoint. DevOps is the new engine for global business growth. All over the planet, organisations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet […]

Nordic enterprises seek Digital Transformation from data centre and cloud vendors

Enterprises in the Nordic countries are investing in Digital Transformation and looking for vendors to help them with their move to the cloud and adoption of Artificial Intelligence (AI) for operations, according to a new report published by Information Services Group (ISG), a leading global technology research and advisory firm. The 2019 ISG Provider Lens […]

Businesses predict huge potential for 5G adoption but are not ready to implement, reveals Cradlepoint study

A new study from Cradlepoint, a global leader in cloud-delivered LTE and 5G Ready wireless network Edge solutions, reveals that businesses expect 5G to be a major part of their technology roadmap but have a long way to go before they are ready to implement a solution. The study, carried out at the 5G World […]

Browse our latest issue

Magazine Cover

View Magazine Archive