www.intelligentciso.com
Open in
urlscan Pro
2606:4700:3036::6815:35ef
Public Scan
Submitted URL: http://intelligentciso.com/
Effective URL: https://www.intelligentciso.com/
Submission: On September 24 via api from US — Scanned from DE
Effective URL: https://www.intelligentciso.com/
Submission: On September 24 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.intelligentciso.com/
<form role="search" method="get" class="search-form" action="https://www.intelligentciso.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
Name: subscribe — POST https://list.mailigen.com/subscribe/post
<form name="subscribe" class="subscribe" action="https://list.mailigen.com/subscribe/post" method="post">
<input type="hidden" name="subscribe" value="true">
<input type="hidden" name="ln" value="en">
<input type="hidden" name="u" value="0f993207d1f399d38d960ece5fa871ea">
<input type="hidden" name="id" value="d2d4768d">
<div class="subscribe-form">
<div class="email-address-field">
<input type="text" class="text" name="merge[0]" accept="email" value="" placeholder="Enter your email address">
</div>
<div class="button"><button id="formSubmit" name="submit" type="submit">Sign up</button><input type="image" name="submit" alt="Subscribe" src="" style="display:none"></div>
</div>
</form>
Name: subscribe — POST https://list.mailigen.com/subscribe/post
<form name="subscribe" class="subscribe" action="https://list.mailigen.com/subscribe/post" method="post">
<input type="hidden" name="subscribe" value="true">
<input type="hidden" name="ln" value="en">
<input type="hidden" name="u" value="0f993207d1f399d38d960ece5fa871ea">
<input type="hidden" name="id" value="d2d4768d">
<div class="subscribe-form">
<div class="email-address-field">
<input type="text" class="text" name="merge[0]" accept="email" value="" placeholder="Enter your email address">
</div>
<div class="button"><button id="formSubmit" name="submit" type="submit">Sign up</button><input type="image" name="submit" alt="Subscribe" src="" style="display:none"></div>
</div>
</form>
Text Content
Skip to content Intelligent CISO Covering Security Across Borders * Home * Regions * Africa * Europe * Middle East * APAC * North America * Technology * Network * Physical * Data * Analysis * Blogs * Insights * Case Studies * Videos * Podcasts * Whitepapers * Content Hubs * Forescout * Contact Us * Other Sites * Intelligent CIO * Intelligent Data Centres * Intelligent Tech Channels * Intelligent SME.tech * Intelligent CXO * Intelligent Briefings * CXO Priorities Search for: LATEST NEWS Research identifies ransomware as top security threat between April-June 2021 Nokia addresses network security as part of its 5G certification program Mimecast launches AI-enabled solution to battle evasive email threats Vectra AI reveals cybersecurity blind spots in PaaS and IaaS environments with security survey Optus notifies customers of cyberattack compromising customer information Uber investigates huge data breach Improving cybersecurity with Managed Security Services Providers NetWitness to showcase NetWitness Platform XDR 12 at GITEX Trellix launches Trellix Advanced Research Center, finds estimated 350,000 open-source projects... X BEFORE YOU GO, KEEP UP-TO-DATE BY... FOLLOWING US ON SOCIAL MEDIA SIGNING UP TO OUR NEWSLETTER Sign up OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION UBER INVESTIGATES HUGE DATA BREACH IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS NETWITNESS TO SHOWCASE NETWITNESS PLATFORM XDR 12 AT GITEX 1. 2. 3. 4. OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION UBER INVESTIGATES HUGE DATA BREACH IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS NETWITNESS TO SHOWCASE NETWITNESS PLATFORM XDR 12 AT GITEX 1. 2. 3. 4. Intelligent Video Conferencing Partner Global ICIO Knowledge Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Partner Digital Transformation Partner Intelligent Partner Intelligent Partner Intelligent Partner Intelligent Email Protection Partner MORE NEWS 14th September 2022 PROOFPOINT TO PROMOTE BETTER PROTECTION OF CRITICAL INFORMATION AT GITEX 2022 9th September 2022 SNOWPLOW EXPERT ON UTILISING PREDICTION MODELS TO ACHIEVE COMPETITIVE... 30th August 2022 SPOTLIGHT SERIES: PAUL DAVIS, DIRECTOR OF FRAUD PREVENTION, TSB BANK 17th August 2022 HIVE, LOCKBIT AND BLACKCAT RANSOMWARE GANGS CONSECUTIVELY ATTACK THE SAME... 11th August 2022 NETSKOPE – SECURITY THAT’S READY FOR ANYTHING 4th August 2022 EATON: TRIPP LITE PRODUCTS RANGES 27th July 2022 DIGITAL FORUM: DRAGOS AND EMERSON EXPERTS DISCUSS SECURING CRITICAL... 26th July 2022 Q&A WITH JOHN GRAHAM-CUMMING, CTO, CLOUDFLARE 26th July 2022 TANIUM EXPERT ON HOW ORGANISATIONS CAN BUILD AN EFFECTIVE DEFENCE AGAINST... 22nd July 2022 DEEP DIVE: ZAC WARREN, CHIEF SECURITY ADVISOR, EMEA, TANIUM EVENTS * Mon 10 Oct 2022 Fri 14 Oct 2022 GITEX Dubai World Trade Centre Find out more. INSIGHTS AGILE IT: THE ROLE OF THE CISO IN COMBATTING THE RISKS OF THE ‘MOVE FAST, FAIL FAST’ CUL... Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI. Here he discusses... DRAGOS EXPERT ON WHY THE ENERGY SECTOR MUST TAKE A PROACTIVE APPROACH TO CYBERDEFENCE The energy sector has undergone immense digitalisation in recent years as organisations have adopted digital tools to help achieve their... HOW MUCH IS ENOUGH? HOW TO BUILD A TARGETED AND SUSTAINABLE CYBERSECURITY BUDGET Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two... HOW TO REMAIN CYBERSECURE WITH ‘BRINGING YOUR OWN DEVICES’ Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with... 1. 2. 3. 4. VIDEOS DEEP DIVE: NICK KING, CHIEF PRODUCT AND MARKETING OFFICER, SNOWPLOW DEEP DIVE: DAN PITMAN, DIRECTOR OF PRODUCT AND TECHNICAL MARKETING AT... SPOTLIGHT SERIES: PAUL DAVIS, DIRECTOR OF FRAUD PREVENTION, TSB BANK NETWORK IOT AND OT SECURITY: THE CHALLENGES, BENEFITS AND WHY YOU SHOULD CARE TOUGH NEW RULES CONFIRMED TO PROTECT UK TELECOMS NETWORKS AGAINST... JUNIPER NETWORKS AND DRAGOS PARTNER TO SECURE CRITICAL INFRASTRUCTURE PHYSICAL ROMANIA EQUIPS ITS PRISONS WITH BODY-WORN CAMERA TECHNOLOGY FROM MOTOROLA SOLUTIONS CHECK POINT SOFTWARE AND PROVISION-ISR TO PROVIDE ON-DEVICE IOT SECURITY... MOTOROLA SOLUTIONS ACQUIRES RUGGEDISED VIDEOTEC DATA OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION UBER INVESTIGATES HUGE DATA BREACH DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION... 1. 2. 3. THOUGHT LEADERSHIP IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS Jon Pratt, CIO at 11:11 Systems, discusses cybersecurity resourcing and the benefits of Managed Security Services.... WHAT IS GOOD CLOUD MIGRATION SECURITY? Cloud adoption continues to be important for many organizations as they transform how they do business in... FUTURE IS FEMALE FOR DATA DEFENDERS Mark Bowen, Editor of Intelligent CIO North America, says the future of the cybersecurity industry, and therefore the... BITDEFENDER EXPERT ON BUILDING A RESILIENT ENTERPRISE SECURITY STRATEGY Enterprises are becoming increasingly concerned with the future of their security strategy post-pandemic. Dan Pitman,... AGILE IT: THE ROLE OF THE CISO IN COMBATTING THE RISKS OF THE ‘MOVE FAST, FAIL F... Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI.... LATEST WHITEPAPERS Palo Alto Networks A Pragmatic Approach to Implementing Zero Trust with... Download Palo Alto Networks Key Considerations for a Successful ZTNA Deployment Download Palo Alto Networks Cover Your SaaS with the Next Evolution of CASB Download Palo Alto Networks Why Your SASE Deployment Should Start with ZTNA 2.0 Download Palo Alto Networks Top Three Use Cases to Make ZTNA 2.0 a Reality Today Download Proofpoint State of the Phish Webinar OnDemand Download BlackBerry Why SMBs must prioritise a prevention-first approach... Download Alcatel-Lucent Enterprise Why Unified Communications as a Service (UCaaS)... Download Alcatel-Lucent Enterprise Asset Tracking and Contact Tracing in Healthcare Download Alcatel-Lucent Enterprise Empower student success with digital transformation Download Alcatel-Lucent Enterprise Smarter, greener, more secure transportation through... Download Alcatel-Lucent Enterprise Smart City Network Architecture Guide Download Alcatel-Lucent Enterprise A digital workplace enables next-generation public... Download Alcatel-Lucent Enterprise Cybersecurity in governments and smart cities Download Alcatel-Lucent Enterprise The Scottish Government: Centralise and secure their... Download Alcatel-Lucent Enterprise How to secure your smart campus in the age of... Download Alcatel-Lucent Enterprise Wembley Park: Alcatel-Lucent Enterprise brings smart... Download Alcatel-Lucent Enterprise Smart highways reduce congestion and save lives Download Alcatel-Lucent Enterprise Hospital of the Future Download Salesforce Marketing Intelligence Report Download Salesforce State of Service Download Salesforce How To Sell Download Barracuda How SASE empowers your business for the cloud... Download Barracuda The state of Office 365 backup Download Barracuda Spear Phishing: Top Threats and Trends Download Barracuda Don’t pay the ransom Download Barracuda The new ABCs of application security Download Palo Alto Networks Zero Trust With Zero Exceptions Download Finesse Robotic Process Automation Download Unit 42 Forrester 2021 State of Enterprise Security Download Palo Alto Networks Palo Alto Networks Cloud-Delivered Security Services... Download Palo Alto Networks 10 Things to Test in Your Future Next-Generation... Download Palo Alto Networks Security Orchestration Automation andResponse... Download Cortex Market Guide for Extended Detection and Response Download Cortex The Forrester New Wave™: Extended Detection And R... Download Cortex The Essential Guide to XDR Download Cortex Surviving Ransomware — What You Need to Know Download Palo Alto Networks The Forrester New Wave™: Zero Trust Network Access, Q... Download Palo Alto Networks Ten Considerations for Evaluating Zero Trust Network... Download Palo Alto Networks Secure Transformation: Replacing Remote Access VPN... Download Palo Alto Networks Availability and Buying Options in the Emerging SASE... Download Palo Alto Networks Small Business Firewall Guide Download Palo Alto Networks Next-Generation Firewall Buyer’s Guide Download Palo Alto Networks The Total Economic Impact Of Palo Alto Networks For... Download Palo Alto Networks The Total Economic Impact™ Of Palo Alto Networks V... Download Palo Alto Networks Five Key Challenges in Private Cloud Security Download Palo Alto Networks Secure Devices Faster at 70 Times Savings Download Whitesource Facing the Log4j Vulnerability Head On The Risk and... Download Unit 42 2022 Unit 42 Ransomware Threat Report Download Dragos Understanding The Challenges of OT Vulnerability... Download Dragos Industrial Cyber Risk Management Download Dragos An Executive’s Guide to Industrial... Download Dragos Executive Summary ICS/OT Cybersecurity Year in... Download Dragos ICS/OT Cybersecurity Year in Review 2021 Download VMware Sharing the Workload of Workload Security Whitepaper Download VMware Cloud Workload Protection: How to Secure Workloads... Download ServiceNow Transformation of Workflows via a Platform Approach... Download Palo Alto Networks Endpoint Prevention and Response EPR Comparative... Download Palo Alto Networks Protect Kubernetes Environments with CN-Series... Download Palo Alto Networks Securing Multi-Cloud Environments with VM-Series... Download Palo Alto Networks An Executive’s E-Guide to Protecting Workloads and D... Download Palo Alto Networks Your Hybrid Infrastructure Is Under Attack Download Palo Alto Networks Next Generation Firewall (NGFW) Competitive... Download Palo Alto Networks Enterprise Data Loss Prevention, Revisited Download Palo Alto Networks Protect Every Device with a 6-Step Approach to... Download Unit 42 IDC: The Critical Nature of Incident Readiness and... Download Unit 42 How to Survive a Breach Download Cortex How To Prepare for the Next Big Cyberattack Download Cortex An Origin Story: The Role Security Orchestration,... Download Cortex Security Orchestration for Dummies Download Palo Alto Networks 2020 Unit 42 IoT Threat Report Download Palo Alto Networks NEXT Is CASB That Actually Secures Your SaaS Download Palo Alto Networks The Evolution of Cloud Access Security Brokers Download Cortex Top Security Orchestration Use Cases Download Cortex The State of Security Automation Download Lookout Cloud and mobile reliance pushes financial services... Download Lookout Integrating security from endpoint to cloud Download Lookout Lookout CASB for Microsoft Office 365 Download Lookout The Authoritative Guide to the Top CASB Use Cases Download Unit 42 Ransomware Threat Report 2021 Download Unit 42 An Ounce of Prevention: Investing in Incident... Download Unit 42 Market Guide for Digital Forensics and Incident... Download Illumio How to Stop Ransomware Attacks Download Illumio Enable End-to-End Zero Trust To Achieve Effective... Download Illumio How to Prevent Ransomware From Becoming a Cyber... Download DriveLock Whitepaper: DriveLock Vulnerability Management Download DriveLock From concept to implementation: 6 steps to greater... Download Palo Alto Networks Meet the Ultimate SASE Trailblazer Customers Download Palo Alto Networks How Palo Alto Networks Enabled the Future of Work... Download Palo Alto Networks Elevating SASE Security: What’s New in Prisma... Download Palo Alto Networks Convergence without Compromise: Introducing Prisma... Download Palo Alto Networks XDR For Dummies Download Palo Alto Networks Navigating the SaaS Security Jungle Download Palo Alto Networks Overcoming Enterprise Data Protection Challenges Download Palo Alto Networks The Enterprise Buyer’s Guide to Integrated CASB Download Palo Alto Networks The Essential Guide to Phishing Investigation and... Download Palo Alto Networks The Essential Guide to Rapid Response Against... Download Palo Alto Networks How Security Approaches Must Evolve to Address... Download Palo Alto Networks Data Center and Hybrid Cloud Security for Dummies Download Palo Alto Networks 10 Things to Test in Your Future Next-Generation... Download Palo Alto Networks 5 Must-Haves to Look For in a Best-in-Class IoT... Download Palo Alto Networks The Role of a Modern Enterprise DLP Solution in... Download Amazon Payment Services Keep your customers coming back. Download Proofpoint The 2021 Ransomware Survival Guide Download Proofpoint The Human Factor 2021 Download Proofpoint The Hidden Costs of Free Download Fireware IBM Security Guardium Insights for IBM Cloud Pak for... Download Fireware The Guardium Integration Application for IBM... Download Fireware The Total Economic Impact Of IBM Security Guardium Download Fireware Five common data security pitfalls to avoid Download Cortex The Essential Guide to the MITRE ATT&CK... Download Cortex What’s Next for Next-Gen Antivirus? Download Cortex How SOAR Is Transforming Threat Intelligence Download Cortex The State of SOAR Report, 2020 Download Unit 42 Investing in Incident Readiness: 2021 ESG E-Book Download Unit 42 2021 Unit 42 Ransomware Threat Report Download Dragos Global Electric Cyber Threat Perspective Download Dragos An Executive’s Guide to Industrial Cybersecurity Download Dragos A Guide to Understanding the 2021 MITRE Engenuity... Download AWS How to Execute a Data-Driven Approach to Cloud... Download AWS Manage your Cloud Migrations Download AWS Running Windows Workloads on AWS Download AWS Get better performance, security and availability... Download AWS Are you utilizing all the compute resources that you... Download AWS Migrate and Host your Microsoft Workloads on AWS... Download Forcepoint 2021 Gartner Strategic Roadmap for SASE Convergence Download Forcepoint Market Guide for Data Loss Prevention Download Forcepoint Risk-Adaptive Data Protection: Stop Breaches Enable... Download Forcepoint The Rise of the Hybrid Workforce Security—Bringing S... Download Forcepoint The Practical Executive’s Guide To Data Loss... Download Forcepoint Enterprise Data Protection Solutions, Explained Download Forcepoint Risk-Adaptive Data Protection: The Behavior-Based... Download Forcepoint White Paper: Your Executive’s Guide to SASE Success Download Forcepoint Quantifying the Benefits of SASE: ESG Research... Download Forcepoint Which SASE Architecture is Right for You? Download OKTA 5 Ways Smart Executives Capture Value with Modern... Download Fortinet Effective AI-Driven Security Operations Download spiderSilk An Overview of Attack Surface Management Download CyberArk A Defense-in-depth Perspective on Ransomware Download CyberArk Best Practices for Ransomware Protection Download CyberArk Full Disclosure: Ransomware Exposed Download CyberArk 4 Steps To Protect What Attackers Are Really After Download Rapid7 4 Key Pillars of Modern Vulnerability Risk... Download Rapid7 Optimize Security Operations with Automation Download Rapid7 Driving Immediate Value with a Cloud SIEM Download Rapid7 2021 Cloud Misconfigurations Report Download Strata 10 Things to Test in Your Future Next-Generation... Download Strata 4 Key Elements of an ML-Powered NGFW Download Strata Next-Generation Firewall Buyer’s Guide Download Strata The Total Economic Impact Of Palo Alto Networks For... Download ServiceNow IT Service Management Is Advancing With The Times Download ServiceNow The Total Economic Impact Of ServiceNow IT Business... Download ServiceNow The Total Economic Impact Of ServiceNow Customer... Download IBM Cost of a Data Breach Report 2021 Download Netscout 5 Things Ransomeware and DDoS Attacks Have in Common Download Netscout DDoS Attacks Have Changed 5 Things You Need to Know Download Netscout Multinational Bank Thwarts DDoS Attack to Repair... Download Netscout 5 Things You Maybe Didn’t Know About DDoS... Download Orange Security Navigator 2021 Download Arcserve Safeguard your data with immutable storage Download Fortinet Exploring Transformation and Trust in the Digital... Download Fortinet Exploring Transformation and Trust in the Digital... Download Fortinet Exploring Transformation and Trust in the Digital... Download Fortinet 10 Questions To Ask Before Making a Security... Download Fortinet 5 Mistakes To Avoid When Evaluating Your Next... Download Fortinet Understanding FortiOS— The Heart of the Fortinet S... Download Fortinet Securing OT in the Face of IIoT and 5G Download Fortinet 5 Challenges with Hybrid and Hyperscale Data Center... Download Fortinet Critical Considerations for Securing Hybrid and... Download Fortinet Fortinet Delivers the Most Flexible SASE Solution Download Fortinet How to Achieve Optimal Internal Segmentation with... Download Fortinet Grow Business with Secure Hybrid and Hyperscale Data... Download Fortinet How To Achieve Secured Wired and Wireless Networks Download Fortinet SD-WAN in the Age of Digital Innovation Download Fortinet SD-WAN Isn’t Just for Retail Download Fortinet Selecting Your Next-Generation Firewall Solution Download Fortinet The 5 Keys to Self-Healing, Secure SD-WAN Download Fortinet The Importance of Self-Healing SD-WAN Download Fortinet The Network Leader’s Guide to Secure SD-WAN Download Fortinet Effective Security-Driven Networking Download Fortinet Top 5 Considerations for Deciding Whether to... Download Fortinet Why Specialized Skills and Tools are Needed for... Download OKTA Have passwords really had their day? Download OKTA Is convenience still king? Why good user experience... Download OKTA CIAM for Dummies Guide Download OKTA IDaaS For Dummies Download OKTA Transforming customer experiences Download OKTA Build vs. Buy Download OKTA Decoding Customer IAM (CIAM) vs. IAM Download BlackBerry Replacing Legacy AV Download BlackBerry Perspectives on life after McAfee Download BlackBerry BlackBerry vs. Traditional AV Solutions Download BlackBerry 5 Tips for Evaluating AI-Driven Security Solutions Download BlackBerry 10 Signs It’s Time To Review Your Endpoint P... Download BlackBerry Security That Travels and Adapts to You Download BlackBerry Don’t Compromise on Security in a Crisis Download BlackBerry BlackBerry Digital Workplace Download ThoughtSpot Dashboards are dead: How modern cloud analytics is... Download AEM Infrastructure and PoE Considerations for Security... Download AEM Ensuring Cable Readiness for IoT Deployments Download Arcserve Ransomware Readiness Assessment: A Proactive... Download Arcserve Protecting The Backup: The New 3-2-1-1 Rule Download Arcserve Proactive Ransomware Defense and Orchestrated... Download Arcserve Guaranteed data recovery from a ransomware attack or... Download Arcserve Assure a Ransomware-Free-Future with Arcserve and... Download Netskope SASE and the Seven Forces Shaping Security... Download Netskope eBook – Digital Transformation Needs a More... Download Netskope Cloud and Threat Report – February 2021 Download VMware UK Security Insights Report Download Netskope 10 Critical Security Projects and How Netskope Can... Download Palo Alto Networks A Pragmatic Approach to Implementing Zero Trust with... Download Palo Alto Networks Key Considerations for a Successful ZTNA Deployment Download Palo Alto Networks Cover Your SaaS with the Next Evolution of CASB Download Palo Alto Networks Why Your SASE Deployment Should Start with ZTNA 2.0 Download WHITEPAPERS Palo Alto Networks A Pragmatic Approach to Implementing Zero Trust with SASE Palo Alto Networks Key Considerations for a Successful ZTNA Deployment Palo Alto Networks Cover Your SaaS with the Next Evolution of CASB Palo Alto Networks Why Your SASE Deployment Should Start with ZTNA 2.0 Palo Alto Networks Top Three Use Cases to Make ZTNA 2.0 a Reality Today Proofpoint State of the Phish Webinar OnDemand * Middle East * Africa * Europe * APAC * North America GISEC GLOBAL LAUNCHES CISO CIRCLE Dubai, United Arab Emirates, 19 September 2022: GISEC GLOBAL, the most connected and influential cybersecurity exhibition and conference in the Middle East and Africa (MEA), has launched its CISO Circle platform for chief information security officers, government leaders and cybersecurity experts. CISO Circle, the new invite-only community launched by Dubai World Trade Centre, the organisers […] DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION... HUAWEI TO ADDRESS FUTURE CYBERSECURITY CHALLENGES AT CSIS 2022 GISEC GLOBAL LAUNCHES CISO CIRCLE Dubai, United Arab Emirates, 19 September 2022: GISEC GLOBAL, the most connected and influential cybersecurity exhibition and conference in the Middle East and Africa (MEA), has launched its CISO Circle platform for chief information security officers, government leaders and cybersecurity experts. CISO Circle, the new invite-only community launched by Dubai World Trade Centre, the organisers […] PROTECTING AN ORGANISATION’S MOST VALUABLE ASSET: WHY A SOLID DATA M... BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2... ROMANIA EQUIPS ITS PRISONS WITH BODY-WORN CAMERA TECHNOLOGY FROM MOTOROLA SOLUTIONS The Romanian National Administration of Penitentiaries has signed a contract with Motorola Solutions to deploy 2100 body-worn cameras to enhance safety and security in all prisons across the country. The new cameras will be used by prison staff during guarding activities and prisoner transport to help deter and de-escalate confrontations and collect video footage in […] TOUGH NEW RULES CONFIRMED TO PROTECT UK TELECOMS NETWORKS AGAINST... SECURITY, SPEED AND CONVENIENCE AT THE HEART OF TSB’S NEW CUSTOMER O... BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2 MILLION PER MONTH Barracuda, a trusted partner and leading provider of cloud-first security solutions, has released its fourth-annual threat research report on ransomware. The new report looks at ransomware attack patterns that occurred between August 2021 and July 2022. For the 106 highly publicised attacks Barracuda researchers analysed, the dominant targets are still five key industries: education (15%), […] CRYPTO-CRIMINAL ACTIVITY HAS FALLEN IN 2022 WITH ILLICIT CRYPTOCURRENCY... JUMIO REVEALS THREE KEY FINDINGS FROM ITS DIGITAL IDENTITY 2022 RESEARCH BLUEVOYANT RESEARCH REVEALS VENDORS CRITICAL TO THE MEDIA INDUSTRY FACE SIGNIFICANT... BlueVoyant, an industry-leading cyberdefence company, has released the findings of a new report; Media Industry Cybersecurity Challenges: A Vendor Ecosystem Analysis. The research found that 30% of media vendors are susceptible to compromise via vulnerabilities discovered in their publicly accessible online presence. These critical vulnerabilities are known to be exploitable by malicious actors. The media […] BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2... CRYPTO-CRIMINAL ACTIVITY HAS FALLEN IN 2022 WITH ILLICIT CRYPTOCURRENCY... INFOGRAPHICS JUMIO REVEALS THREE KEY FINDINGS FROM ITS DIGITAL IDENTITY 2022 RESEARCH Providing a digital identity to create an online account or complete a transaction is becoming more commonplace globally. A digital... GLOBAL ORGANISATIONS CONCERNED DIGITAL ATTACK SURFACE IS SPIRALLING OUT OF CONTROL Trend Micro, a leader in cloud security, has announced the findings of a new global study indicating that organisations are struggling to... BAD ACTORS INNOVATE, EXTORT AND LAUNCH 9.7M DDOS ATTACKS IN 2021, ACCORDING TO REPORT NETSCOUT Systems has announced findings from its bi-annual Threat Intelligence Report. During the second half of 2021, cybercriminals... STUDY FINDS PRIVACY IS NOW MISSION-CRITICAL FOR ORGANISATIONS WORLDWIDE Cisco has published its 2022 Data Privacy Benchmark Study, an annual global review of privacy corporate practices on the impact of... 1. 2. 3. 4. BLOGS VULNERABILITY ASSESSMENT, PENETRATION TESTING OR RED TEAMING: WHICH IS RIGHT... THE CISO IN 2021: COPING WITH THE NOT-SO-CALM AFTER THE STORM WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS: FIVE KEY... SECURITY IS ABOUT MORE THAN THE NETWORK A PANDEMIC OF CYBERATTACKS RANSOMWARE 2020: A YEAR OF MANY CHANGES CASE STUDIES DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION SOLUTIONS TO DRIVE... SECURITY, SPEED AND CONVENIENCE AT THE HEART OF TSB’S NEW CUSTOMER ONBOARDING JOURNEY WHY EDUCATING AND EMPOWERING YOUR END-USER IS KEY TO ACHIEVING ROBUST CYBERSECURITY LATEST PODCASTS Karl Thedeen, CEO at Outpost24 Listen now Simon Mair, Head of Information Security and Data Privacy at Brewin... Listen now Peter Jackson, Chief Data and Analytics Officer, Exasol Listen now Vaibhav Jain, Founder and CEO, Hubilo Listen now Martijn de Lange, CEO at Hermes UK Listen now Robin Smith, CISO, Aston Martin Listen now Jamie Akhtar, CEO and co-founder of CyberSmart Listen now Prakash Sethuraman, CISO, CloudBees Listen now Karl Thedeen, CEO at Outpost24 Listen now Simon Mair, Head of Information Security and Data Privacy at Brewin... Listen now Peter Jackson, Chief Data and Analytics Officer, Exasol Listen now Vaibhav Jain, Founder and CEO, Hubilo Listen now BLOGS VULNERABILITY ASSESSMENT, PENETRATION TESTING OR RED TEAMING: WHICH IS RIGHT FOR YOUR... THE CISO IN 2021: COPING WITH THE NOT-SO-CALM AFTER THE STORM WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS: FIVE KEY ELEMENTS GO PHISH GO PHISH: ZACH POWERS, CISO AT BENCHLING What would you describe as your most memorable achievement in the cybersecurity industry? In security, people are often enamoured by our... GO PHISH: MATIAS MADOU, CO-FOUNDER AND CTO OF SECURE CODE WARRIOR We ‘go phishing’ with Matias Madou, Co-founder and CTO of Secure Code Warrior, who tells us about life inside and... GO PHISH: LEE WRALL, CO-FOUNDER AND DIRECTOR, EVERYTHING TECH Lee Wrall is the Co-founder and Director of Everything Tech – a Managed Service Provider (MSP). We speak to him about life inside... GET TO KNOW: MICHAEL KLECK, CISO, ALCHEMER On the lighter side of things, we ask Michael Kleck, CISO, Alchemer, what makes him tick. What would you describe as your most memorable... 1. 2. 3. 4. DEEP DIVE GO PHISH: BERNARD BRANTLEY AT CORELIGHT We ‘go phishing’ Bernard Brantley at Corelight, who tells us about life inside and outside the office. 1. What would you describe as your most memorable achievement in the cybersecurity industry?... GO PHISH: PAUL CALATAYUD, CHIEF INFORMATION SECURITY AND PRIVACY OFFICER AT AQUA... We ‘go phishing’ with Paul Calatayud, Chief Information Security and Privacy Officer at Aqua Security, who tells us about life inside and outside the office. What would you describe as... DEEP DIVE – ADAM PHILPOTT, CHIEF REVENUE OFFICER AT TRELLIX https://intelligentbriefings.wistia.com/medias/1mxs4kcqvi?embedType=iframe&seo=false&videoFoam=true&videoWidth=640... GO PHISH: JAMEEKA GREEN AARON, CISO OF AUTH0 We ‘go phishing’ with Jameeka Green Aaron, CISO of Auth0, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in... DEEP DIVE – SPENCER LICHTENSTEIN, PRODUCT STRATEGIST, RSA SECURITY In this edition of our Deep Dive series, Spencer Lichtenstein, Product Strategist at RSA Security, talks us through the steps organisations must take when launching a remote SOC. https://intelligentbriefings.wistia.com/medias/karf4qx9h2?embedType=async&seo=false&videoFoam=true&videoWidth=640... CLOSING THE SKILLS GAP: THE ART OF FINDING AND RETAINING CYBERSECURITY TALENT The cybersecurity skills gap is not going away any time soon. Tim Bandos, CISO at Digital Guardian, explains how companies shouldn’t always rely on the same channels to look for... TAKE THE PRESSURE DOWN! FOUR WAYS TO LOWER THE STRESS LEVELS OF YOUR CYBERSECURITY TEAM A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills... LATEST THREATS OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION Following a cyberattack, Optus, one of the largest telecommunications companies in Australia, is investigating the possible unauthorised access of current and former customers’ information. Upon discovering this, Optus immediately shut down the attack. Optus is working with the Australian... UBER INVESTIGATES HUGE DATA BREACH Uber, one of the world’s leading automotive companies, has announced it has suffered a data breach. In a statement released by the company, it said: ‘An Uber EXT contractor had their account compromised by an attacker. It is likely that the attacker purchased the contractor’s... CYBEREASON WARNS GLOBAL CRITICAL INFRASTRUCTURE OPERATORS AFTER ATTACKS FROM RANSOMWARE... Cybereason has issued a global Threat Analysis Report investigating the Ragnar Locker ransomware gang and its attacks on networks of global critical infrastructure operators. Ragnar Locker first emerged in 2019 and since its debut hundreds of companies have been victimised. Cybereason assesses... RESEARCH HIVE, LOCKBIT AND BLACKCAT RANSOMWARE GANGS CONSECUTIVELY ATTACK THE SAME NETWORK,... Sophos, a global leader in next-generation cybersecurity, has announced in the Sophos X-Ops Active Adversary whitepaper, Multiple... TCS STUDY REVEALS CYBER THREATS WITHIN DIGITAL ECOSYSTEMS MAY BE AN ENTERPRISE BLIND... Tata Consultancy Services (TCS) has announced findings from its TCS Risk & Cybersecurity Study, which reveals that cyber executives... TRELLIX REPORT FINDS BUSINESS SERVICES TOP TARGET OF RANSOMWARE ATTACKS A report by one of the industry’s leading tech giants, Trellix, explores the cybersecurity trends and attack methods from the first... SAS IS A LEADER IN ANTI-MONEY LAUNDERING SAYS RESEARCH FIRM REPORT Global AI and analytics titan SAS has been named a leader in anti-money laundering solutions by Forrester. The Forrester Wave:... 1. 2. 3. 4. GET INTELLIGENT CISO NEWS DELIVERED TO YOUR INBOX Sign up ABOUT INTELLIGENT CISO Intelligent CISO is a technology intelligence platform aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the global community. GET IN TOUCH UK Head Office 63/66 Hatton Garden London, EC1N 8LE Phone: +44 (0) 20 3026 6825 Copyright © 2022 Intelligent CISO | Privacy Policy | A Lynchpin Media Brand Browse our latest issue View Magazine Archive ×