<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyberattacks Archives - The Integrator</title>
	<atom:link href="https://integratormedia.com/tag/cyberattacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://integratormedia.com/tag/cyberattacks/</link>
	<description>EMEA&#8217;s Most Sought-After Publication by SMEs and Global Corporates</description>
	<lastBuildDate>Mon, 11 Dec 2023 15:06:48 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Vectra Announces New Appointments to EMEA Leadership</title>
		<link>https://integratormedia.com/2022/08/19/vectra-announces-new-appointments-to-emea-leadership/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vectra-announces-new-appointments-to-emea-leadership</link>
					<comments>https://integratormedia.com/2022/08/19/vectra-announces-new-appointments-to-emea-leadership/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 19 Aug 2022 13:46:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[appointments]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[EMEA leadership team]]></category>
		<category><![CDATA[security leaders]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[Vectra]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=12994</guid>

					<description><![CDATA[<p>Vectra, a provider of threat detection for multi-cloud enterprises, has announced two new appointments to its EMEA leadership team. The announcement sees Teppo Halonen appointed as Vice President of EMEA, and Christian Borst named as Chief Technical Officer of EMEA. Vectra’s new EMEA leadership team will work closely with customers and partners to develop security [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2022/08/19/vectra-announces-new-appointments-to-emea-leadership/">Vectra Announces New Appointments to EMEA Leadership</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Vectra, a provider of threat detection for multi-cloud enterprises, has announced two new appointments to its EMEA leadership team. The announcement sees Teppo Halonen appointed as Vice President of EMEA, and Christian Borst named as Chief Technical Officer of EMEA. Vectra’s new EMEA leadership team will work closely with customers and partners to develop security strategies and assist them with securing digital transformation and cloud adoption projects.</p>
<div id="attachment_12997" style="width: 139px" class="wp-caption alignleft"><a href="https://varonline.com/wp-content/uploads/2022/08/Teppo-Halonen-Vice-President-of-EMEA-Vectra-scaled-e1660916900797.jpg"><img decoding="async" aria-describedby="caption-attachment-12997" class="wp-image-12997 " src="https://varonline.com/wp-content/uploads/2022/08/Teppo-Halonen-Vice-President-of-EMEA-Vectra-scaled-e1660916900797-234x300.jpg" alt="" width="129" height="165" /></a><p id="caption-attachment-12997" class="wp-caption-text"><em>Teppo Halonen &#8211; VP of EMEA, Vectra</em></p></div>
<p>Willem Hendrickx, CRO at Vectra says, “by bolstering the EMEA leadership team, we can work even more closely with partners to help customers on their journeys and identify the behavioral signs of cyberattacks and stop them before they become breaches.”</p>
<p>Teppo Halonen moves from his previous role at Vectra as Regional Director for North Europe, a position he has held since June 2020. Christian Borst boasts an extensive background in cybersecurity and joins Vectra as Chief Technical Officer for EMEA. “I am excited to join such a vibrant team of security professionals to help our clients boost their cyber resilience,” comments Borst. “I am looking forward to enriching exchanges with security leaders, teaming up to define tomorrow’s responses to the ever-evolving threat landscape.”</p>
<p>The post <a href="https://integratormedia.com/2022/08/19/vectra-announces-new-appointments-to-emea-leadership/">Vectra Announces New Appointments to EMEA Leadership</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2022/08/19/vectra-announces-new-appointments-to-emea-leadership/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet Predicts Cyberattacks Aimed at Everything From Crypto Wallets to Satellite Internet</title>
		<link>https://integratormedia.com/2021/12/26/fortinet-predicts-cyberattacks-in-2022/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fortinet-predicts-cyberattacks-in-2022</link>
					<comments>https://integratormedia.com/2021/12/26/fortinet-predicts-cyberattacks-in-2022/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 26 Dec 2021 05:12:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[FortiGuard]]></category>
		<category><![CDATA[fortinet]]></category>
		<category><![CDATA[Predictions 2022]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Supply Chain Attacks]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=11674</guid>

					<description><![CDATA[<p>Fortinet unveiled its predictions about the cyberthreat landscape for 2022 and beyond. Derek Manky, Chief, Security Insights &#38; Global Threat Alliances, FortiGuard Labs articulates, “Cybercriminals are evolving and becoming more like traditional APT groups; zero-day equipped, destructive, and able to expand their techniques as needed to achieve their goals.” He added, “We will see attacks [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2021/12/26/fortinet-predicts-cyberattacks-in-2022/">Fortinet Predicts Cyberattacks Aimed at Everything From Crypto Wallets to Satellite Internet</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Fortinet unveiled its predictions about the cyberthreat landscape for 2022 and beyond. Derek Manky, Chief, Security Insights &amp; Global Threat Alliances, FortiGuard Labs articulates<em>, </em>“Cybercriminals are evolving and becoming more like traditional APT groups; zero-day equipped, destructive, and able to expand their techniques as needed to achieve their goals.” He added, “We will see attacks spanning further outside of the extended network, even into space, as attackers take advantage of a fragmented perimeter, siloed teams and tools as well as a greatly expanded attack surface. These threats will leave overwhelmed IT teams scrambling to cover every possible avenue of attack.”</p>
<p>Following are the highlights of the prediction report made by FortiGuard Labs:</p>
<ul>
<li><strong><em>Ransomware will get more destructive:</em></strong> There will continue to be a crimeware expansion and ransomware will remain a focus going forward. Ransomware attacks could be a concern for emerging edge environments, critical infrastructure, and supply chains.</li>
<li><strong><em>Cybercriminals use ai to master deep fakes:</em></strong> Cybercriminals are also leveraging AI to thwart the complicated algorithms used to detect their abnormal activity. Going forward, this will evolve as deep fakes become a growing concern because they leverage AI to mimic human activities and can be used to enhance social engineering attacks.</li>
<li><strong><em>More attacks against lesser targeted systems in the supply chain:</em></strong> In many networks, Linux runs many of the back-end computing systems, and until recently, it has not been a primary target of the cybercriminal community. Recently, new malicious binaries have been detected targeting Microsoft’s WSL (Windows Subsystem for Linux). This further expands the attack surface into the core of the network and increases the threats that need to be defended in general. This has ramifications for operational technology (OT) devices and supply chains in general that run on Linux platforms.</li>
<li><strong><em>Cybercrime targets space:</em></strong> FortiGuard Labs expects to see new proof-of-concept (POC) threats targeting satellite networks over the next year as satellite-based internet access continues to grow. The biggest targets will be organizations that rely on satellite-based connectivity to support low-latency activities, such as online gaming or delivering critical services to remote locations, as well as remote field offices, pipelines, or cruises and airlines.</li>
<li><strong><em>Cybercriminals thrive living off the land at the edge:</em></strong> A new edge-based threat is emerging. Edge malware could monitor edge activities and data and then steal, hijack, or even ransom critical systems, applications, and information while avoiding being detected.</li>
</ul>
<p>The post <a href="https://integratormedia.com/2021/12/26/fortinet-predicts-cyberattacks-in-2022/">Fortinet Predicts Cyberattacks Aimed at Everything From Crypto Wallets to Satellite Internet</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2021/12/26/fortinet-predicts-cyberattacks-in-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New F5 security products enhance app protection</title>
		<link>https://integratormedia.com/2018/08/05/f5-security-products-improve-protection-for-apps/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=f5-security-products-improve-protection-for-apps</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 05 Aug 2018 12:55:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[VAR News]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[F5]]></category>
		<category><![CDATA[Networks]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=9603</guid>

					<description><![CDATA[<p>F5 Networks introduced new offerings that provide advanced access controls and dedicated SSL visibility with orchestration capabilities to help thwart today’s most sophisticated cyber attacks. F5 SSL Orchestrator: Unified Management of Encrypted Application Traffic: While most traffic and data handled by applications is now encrypted, many security stack service offerings (e.g., firewalls and IPS) are [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2018/08/05/f5-security-products-improve-protection-for-apps/">New F5 security products enhance app protection</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>F5 Networks introduced new offerings that provide advanced access controls and dedicated SSL visibility with orchestration capabilities to help thwart today’s most sophisticated cyber attacks.</p>
<p><b>F5 SSL Orchestrator: Unified Management of Encrypted Application Traffic</b>: While most traffic and data handled by applications is now encrypted, many security stack service offerings (e.g., firewalls and IPS) are unable to efficiently process SSL encrypted traffic at the scale and speed businesses demand. Beyond mere SSL awareness and offload, F5 <a href="https://f5.com/products/security/ssl-orchestrator">SSL Orchestrator</a> provides policy-based orchestration capabilities across the full security service chain for any network topology, device, or application. Orchestration on this level groups devices into services to intelligently decrypt and steer traffic, allowing for independent monitoring, load balancing, and scaling to adapt to changing network conditions and increasing traffic demands. This marks a vast improvement over the industry’s legacy security model, where piecemeal inspection devices perform decryption independently, frequently leaving gaps for attackers. As a dedicated security appliance delivering insight to mitigate threats traversing the network, SSL Orchestrator provides:</p>
<ul>
<li>Operational Efficiency – Dynamic service chaining and policy-based traffic steering help organizations intelligently manage encrypted traffic flows across the entire app security infrastructure.</li>
<li>Full Visibility – High-performance decryption and encryption of inbound and outbound SSL/TLS traffic, enabling quicker threat detection and attack remediation.</li>
<li>Improved Risk Management – SSL orchestration enables organizations to maximize their investments around malware, DLP, ransomware, and firewall protections, safeguarding user privacy through hardened security with robust cipher management.</li>
</ul>
<p><b>F5 Access Manager: New Identity-Aware Access Proxy</b>: Applications remain the principal gateways to organizations’ and individuals’ valuable information. F5 <a href="https://f5.com/products/big-ip/access-manager">Access Manager</a> protects sensitive data with a Zero Trust model while providing access for authorized users, devices, and APIs, guarding against pervasive threats such as man-in-the-middle attacks. Product features enable organizations to think outside of traditional security boundaries, empowering them to unlock additional business models and operational efficiencies without compromising protections around apps, users, and data. As a secure, flexible, high-performance proxy solution delivering unified global access management, F5 Access Manager provides:</p>
<ul>
<li>Streamlined Access Controls – Context-sensitive policies with guided configuration deliver trusted access to users, devices, and APIs for increased business efficiency, while real-time web-form encryption safeguards user credentials and prevents fraud.</li>
<li>Accelerated Business Innovation – As IT transforms to support continuous deployment methodologies, Access Manager provides a centralized solution for access control, including API authorization. This means DevOps teams can hand off apps to NetOps personnel more quickly, and NetOps can better deliver a consistent user experience without sacrificing manageability.</li>
<li>Scalability into the Cloud – While SaaS and cloud applications provide numerous advantages, many organizations are choosing not to move all apps off-premises. With advanced F5 Virtual Edition support and high-capacity licensing, Access Manager provides the scale necessary to bridge on-prem app functionality to the cloud, effectively integrating with IDaaS solutions and capabilities to support evolving heterogenous environments.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://integratormedia.com/2018/08/05/f5-security-products-improve-protection-for-apps/">New F5 security products enhance app protection</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Condo Protego sees growing demand for cybersecurity solutions from UAE public sector</title>
		<link>https://integratormedia.com/2016/12/21/condo-protego-sees-strong-uae-public-sector-growing-demand-for-cybersecurity-solutions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=condo-protego-sees-strong-uae-public-sector-growing-demand-for-cybersecurity-solutions</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 21 Dec 2016 09:46:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Condo Protego]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=7178</guid>

					<description><![CDATA[<p>The UAE is staking its global leadership in securing Smart City services and protecting critical national infrastructure. In the interconnected Internet of Things era, the UAE is one of the world’s best-prepared countries in cybersecurity, ranking 17 out of 105 countries by the United Nations’ International Telecommunications Union. The Dubai government also recently launched its [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2016/12/21/condo-protego-sees-strong-uae-public-sector-growing-demand-for-cybersecurity-solutions/">Condo Protego sees growing demand for cybersecurity solutions from UAE public sector</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The UAE is staking its global leadership in securing Smart City services and protecting critical national infrastructure.</p>
<p>In the interconnected Internet of Things era, the UAE is one of the world’s best-prepared countries in cybersecurity, ranking 17 out of 105 countries by the United Nations’ International Telecommunications Union. The Dubai government also recently launched its Cyber Security Strategic Plan to enhance protection of government services.</p>
<p>“As more Smart City and government services become digitized, the Internet of Things is a cyberattack force multiplier, with critical national infrastructure especially at risk. The UAE government is at the global forefront of protecting Smart Cities and providing residents with peace of mind while using government services,” said Andrew Calthorpe, CEO at the UAE-based Smart City consultancy Condo Protego.</p>
<p>With the number of connected devices more than doubling from 23 billion in 2016 to 50 billion by 2020, cyberattacks will shift to “disruptive” and “destructive” attacks, especially on the hybrid cloud, mobile devices, and critical national infrastructure, according to a report by cybersecurity firm RSA presented at the recent RSA Conference Abu Dhabi.</p>
<p>As a result, Condo Protego is seeing strong UAE public sector demand for cybersecurity solutions with advanced threat detection and response, such as RSA’s Security Analytics.</p>
<p>“Channel partners are vital for guiding public sector adoption of cloud or on-premise solutions to future-proof services, and the cybersecurity solutions with the full visibility, analysis, and action to prevent cyberattacks in real-time,” added Andrew Calthorpe.</p>
<p>The post <a href="https://integratormedia.com/2016/12/21/condo-protego-sees-strong-uae-public-sector-growing-demand-for-cybersecurity-solutions/">Condo Protego sees growing demand for cybersecurity solutions from UAE public sector</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
