Blogs

Cisco expert on building and securing 5G networks of tomorrow

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will create new risks. And according to Ali Amer, Managing Director, Global Service Provider...

How to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: m...

Ransomware: An action plan – by Steven Malone of Mimecast

Steven Malone, Director of Security Product Management at Mimecast, talks us through an action plan to improve your cyber resilience. The global reach and considerable impact of the WannaCrypt (WannaCry/Wcry)...

WannaCry attacks qualify as virus disaster many times over

Over a dozen years ago, malware pioneer Dr Peter Tippett coined the expression virus disaster, which describes the point at which more than 25 machines are infected on a single network as the tipping point for...

Help AG releases advisory on WannaCry ransomware threat

On 12th May, a mass ransomware attacked started hitting hospitals, telecom service providers, universities and other institutions worldwide, using the malware WannaCry, WanaCrypt0r 2.0. It is found to be perpetrated...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive