Intelligent Enterprise Security
Yahoo most impersonated brand in Q4 2022 phishing attacks
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its Brand Phishing Report for Q4 2022. The report highlights the brands that were most frequently imitated by cybercriminals in...
Simplifying security on the path to a multi-cloud future
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their data, said Petko Stoyanov, Global Chief Technology Officer at Forcepoint. He examines why this is important and offers some best practice advice for...
Imperva discovers vulnerability affecting 2.5 billion Chrome users
Imperva, a leader in the digital security space, has revealed a new vulnerability dubbed CVE-2022-40764. Discovered by Imperva’s Threat Research Team, it has been found to affect more than 2.5 billion users of Google Chrome and Chromium-based browsers. The vulnerability is based on the way...
Arizona partners with Thales to provide more secure driver’s...
The Arizona Department of Transportation, Motor Vehicle Division (MVD), has awarded Thales a three-year contract to upgrade the security features and redesign the appearance of Arizona driver’s licenses and ID cards. Arizona MVD and Thales will collaborate on card design elements that bring...
Features
Three key ingredients for the ideal Disaster Recovery strategy
Don Boxley, CEO and Co-Founder, DH2i, considers three components that the best DR strategies should incorporate. As...
Future is female for data defenders
Mark Bowen, Editor of Intelligent CIO North America, says the future of the cybersecurity industry, and therefore the long-term...
Experts discuss the changing role of the CISO and its impacts on management style
The role of the Chief Information Security Officer (CISO) has notably changed since the COVID-19 pandemic – arguably the biggest...
Expert advice for layering up your defences this World Password Day
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We...
Insights
Simplifying security on the path to a multi-cloud future
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their...
Counting the cost of the biggest BEC attacks
Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email...
Expert advice for layering up your defences this World Password Day
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We...
Eight guiding principles for Zero Trust in banking and financial services today
Security leaders will be familiar with the term ‘Zero Trust’ – an approach crucial as vulnerabilities and attacks are...
Case Studies
Cohesity strengthens backup and data management capabilities for Sky Lakes
After a recommendation from Cisco, Sky Lakes Medical Center, an internationally accredited acute-care teaching hospital serving more than...