Blogs

How to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including:...

Ransomware: An action plan – by Steven Malone of Mimecast

Steven Malone, Director of Security Product Management at Mimecast, talks us through an action plan to improve your cyber resilience. The global reach and considerable impact of the WannaCrypt (WannaCry/Wcry)...

WannaCry attacks qualify as virus disaster many times over

Over a dozen years ago, malware pioneer Dr Peter Tippett coined the expression virus disaster, which describes the point at which more than 25 machines are infected on a single network as the tipping point for...

Help AG releases advisory on WannaCry ransomware threat

On 12th May, a mass ransomware attacked started hitting hospitals, telecom service providers, universities and other institutions worldwide, using the malware WannaCry, WanaCrypt0r 2.0. It is found to be perpetrated...

WannaCry just showed why healthcare is lagging in security

Healthcare is an industry under siege. This statement was true yesterday and was underscored by the massive ransomware attack. Care providers are targeted by cybercriminals with greater frequency than any other...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive