Magazine Button

Blogs

Every day is a new data protection day

Daniel Fried, General Manager and Senior Vice President, EMEA and Worldwide Channels at Veeam, on CIO challenges and the ongoing data protection conundrum for organisations across all industries in the region. The events of 2020 have profoundly changed the way businesses across EMEA work – with millions of employees now working from their home offices, […]


Overcoming ‘work from home’ security challenges: Security beyond the VPN

With IT leaders concerned about the challenges of securing employee’s access to the corporate network, Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox, looks at some rising threats that could be encountered. With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned […]


No silver bullet to deal with cyberattacks

Yaniv Hoffman, Vice President Technologies, Radware, tells Intelligent CIO APAC, how the attack surface has expanded in recent times. The pandemic threatening our global economy, has impacted significantly online behavior and the security of businesses and individuals. The massive increase in online activity, plus increased dependency on online services, means that attacks have a greater […]


Subex expert on the cyberthreats facing manufacturers

Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s critical that CIOs take steps to secure their critical infrastructure. Vinod Kumar, CEO, Subex, tells us about the challenges facing manufacturing firms and how they can get ahead of attackers. Can you tell us about some […]


Fearless innovation: Powered by hackers

Russell Coleman, Co-ordinated Disclosure Advisor at HackerOne, explains how ethical hacking can help organisations improve their cybersecurity. You may have an image in your head of what a hacker is. Pop culture and some fearmongering security vendor marketing still depicts them as hooded social outcasts, maybe driven by greed or a need to make trouble […]


The Domain Game: How email attackers are buying their way into inboxes

Cybercriminals are taking advantage of the current climate, targeting remote workers via email in a bid to obtain the ‘keys to the kingdom’. Dan Fein, Director of Email Security Products, Darktrace, tells us why organisations must take a new approach to email security to tilt the scales in favour of the defenders. It is by […]


Making a case for OT cybersecurity investment: How to present to the board

Operational Technology (OT) is at a growing risk of cyberattack, bringing with it the danger of far-reaching and costly impacts. But OT in most traditional heavy industries and infrastructure facilities have been run in silos behind ‘air gaps’ for so long that the Board assumes they are safe from attack. “Traditional approaches are no longer […]


How can vendors and end-users get the best out of their partnerships?

One of the challenges that modern CISOs face is knowing where to channel investment. And given that are many vendors, often offering similar services, choosing a provider or product can be difficult. A good vendor-end-user relationship based on trust and long-term partnerships is crucial. We asked three industry experts how vendors and end-users can get […]


Stand to lose everything through lack of awareness

There are a growing number of attacks and almost all of the successful ones have come from an insider being compromised through deception, negligence or a lack of awareness. J2 Software CEO John McLoughin says companies need to attack or face being attacked themselves and stand to lose everything. The common response to a cyberattack […]


Tackling the trillion dollar identity fraud crises

Online identity theft syndicates are dealt a significant blow as proven remote digital identity technology platform goes mainstream. Fraud costs trillions of dollars to world economies annually and, for consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma. Worldwide, around 40% […]


Browse our latest issue

Intelligent CISO

View Magazine Archive