Magazine Button

Research

Regional enterprises not taking action to secure privileged access to cloud, research reveals

Centrify, a leading provider of cloud-ready zero trust privilege to secure modern enterprises, has announced results of an onsite poll conducted during GITEX 2019. Overall, a majority of respondents indicated that Privileged Access Management (PAM) was important for their organisation, with more than 90% of respondents indicating that PAM is important in their overall cybersecurity […]


Mimecast report finds increase in Business Email Compromise (BEC) attacks

Mimecast, a leading email and data security company, has announced the availability of its latest Email Security Risk Assessment (ESRA). The quarterly assessment is an aggregated report of tests that measure the efficacy of widely used email security systems. This quarter’s ESRA report found a significant increase in Business Email Compromise (BEC) attacks, emails containing […]


McAfee report shows cloud-native breaches differ from malware attacks of the past

McAfee, the device-to-cloud cybersecurity company, has released Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report, covering new research on Infrastructure-as-a-Service (IaaS) incidents in the cloud. According to industry analysts, IaaS is now the fastest growing area of the cloud due to the speed, cost and reliability with which organisations can create and deploy applications. The results of […]


Three in four CIOs say enterprise cloud complexity makes IT performance challenging

Software intelligence company, Dynatrace, has announced the findings of an independent global survey of 800 CIOs, which reveals that Digital Transformation, migration to the enterprise cloud and increasing customer demands are creating a surge in IT complexity and the associated costs of managing it. Technical leaders around the world are concerned about the effect this […]


EMEA identified as global hotspot for brute force access attacks

EMEA is a global hotspot for brute force access attacks, according to research from F5 Labs. The analysis forms part of the Application Protection Report 2019, which explores the fact that most applications are attacked at the access tier, circumventing legitimate processes of authentication and authorisation. Brute force attacks are typically defined as either 10 […]


Business success linked to digital employee experience, according to VMware study

VMware, a leading innovator in enterprise software, has released its annual report into the state of digital workspace technologies and its impact on businesses. The study reveals that high growth companies that invest more in the digital employee experience are more likely to achieve business growth, have a progressive culture, retain talent and be rated […]


Secureworks reveals details and tactics behind the LYCEUM threat group

The Secureworks Counter Threat Unit (CTU) has discovered that the threat group LYCEUM is targeting organisations in sectors of strategic national importance, including oil and gas and possibly telecommunications. The previously unobserved threat group has been targeting critical infrastructure for more than 12 months, with research indicating that the group may have been active from […]


The CISO Challenge: Managing Threats with Limited Resources

Learn more about the key findings of Making Tough Choices: How CISOs Manage Escalating Threats and Limited Resources, a report conducted by Fortinet and Forbes Insights.#


Cyber adversaries up the ante on evasion and anti-analysis to avoid detection

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their […]


Lack of collaboration between C-suite and IT teams holds back Digital Transformation

According to NTT Ltd.’s 2019 Digital Means Business Report, only 11% of organisations are highly satisfied with those in charge of spearheading Digital Transformation, despite the fact that almost three-quarters of them are already underway on their journey. Organisations worldwide are achieving some success with Digital Transformation, but there’s still a strong belief that this […]


New Mimecast report reveals analysis of 67 billion rejected emails

Mimecast Limited, a leading email and data security company, has launched its first Threat Intelligence Report: Black Hat Edition 2019. The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers. Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active […]


Research reveals criminals’ most effective weapon in ransomware attacks

Vectra, a leader in network threat detection and response (NDR), has disclosed that cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in Infrastructure-as-a-Service (IaaS) cloud providers.  Attackers can easily evade network perimeter security and perform internal reconnaissance […]


Browse our latest issue

Magazine Cover

View Magazine Archive