Magazine Button

Latest Whitepapers

Navigating cyberattacks: Strategies for resilient recovery

Majd Sinan, Security Leader, Gulf, Levant and Pakistan at IBM, tells us how minimizing the impact of ransomware attacks demands a shift in mindset. Imagine your organisation was just hit by a ransomware attack, and all your data is suddenly inaccessible. Your files have been encrypted by a hacker, who is now demanding a hefty […]

Email security remains critical as threat actors embrace AI

African ICT business Datacentrix, highlights the importance of protecting business email, which still accounts for around 90% of breaches today. Email compromise still accounts for around 90% of breaches that occur within business on a daily basis, something that, in most instances, can be blamed on user error. “New and evolving threats are landing in […]

Expert urges universities to make cybersecurity a priority after attack on University...

The University of Cambridge has been hit by a malicious denial of service attack. As a result, Internet access became intermittent and incoming connections to websites, the Virtual Learning Environment (VLE) and VPN were also impacted. Paul Holland, cybersecurity expert and CEO of Beyond Encryption, said: “Universities are not immune from on-going digitalisation, with the […]

Zespri’s Cybersecurity Transformation: A Fruitful Partnership with Palo Alto Networks

Tim Lloyd, Head of Digital Operations, for New Zealand based Zespri International, the world’s largest marketer of kiwifruit, talks Intelligent CIO through the collaboration with Palo Alto Networks that transformed its cybersecurity capacity. In an era where cybersecurity threats are constantly evolving, organisations must remain vigilant and proactive to protect their digital assets and operations. […]

Championing privacy-first security: Harmonizing privacy and security compliance

Emily Hancock, Data Privacy Officer at Cloudflare, tells us the key to ensuring data privacy lies in the implementation of effective data security. The conventional perception often pits security against privacy. Establishing robust security measures involves identifying potential threats, yet this process may involve scrutinising sensitive or personal data, posing a risk to privacy. In […]

C-level Insights: Madrid-based CISO Isabel María Gómez

Isabel María Gómez, a Madrid-based CISO, describes the biggest challenges for cybersecurity leaders in the evolving digital landscape, discusses the importance of understanding broader business objectives, and tells us about...

Championing privacy-first security: Harmonizing privacy and security compliance

Emily Hancock, Data Privacy Officer at Cloudflare, tells us the key to ensuring data privacy lies in the implementation of effective data security. Emily Hancock, Data Privacy Officer at Cloudflare...

Go Phish: Stuart Jubb, Group Managing Director, Crossword Cybersecurity

On the lighter side of things, we Go Phishing with Stuart Jubb, Group Managing Director, Crossword Cybersecurity, about what makes him tick. Stuart Jubb, Group Managing Director, Crossword Cybersecurity What...

The CISO’s next priority isn’t technology – it’s building a great employee exper...

Security operations expert, Leon Ward, VP of Product Management, ThreatQuotient, says it’s time to get real about the people side of cybersecurity automation. Leon Ward, VP of Product Management, ThreatQuotient...

The growing role of CISOs in the future of cybersecurity governance

Sunny Tan, Head of Security for Southeast Asia, BT Group, explains how the evolving role of Chief Information Security Officers (CISOs) is becoming increasingly pivotal in shaping the future of...

Why CIOs need to pay attention to API Security in 2024

Nick Rago, Field CTO at Salt Security, discusses the critical role of Chief Information Officers in fortifying API security against the backdrop of increasing cyberthreats and the evolving demands of...

Deep Dive: Sujatha Narasimhan, Senior Sales Engineer at Mimecast

https://intelligentbriefings.wistia.com/medias/7ax20nh97p?embedType=iframe&seo=false&videoFoam=true&videoWidth=640...

Cybersecurity experts respond to LockBit takedown

LockBit, a notorious cybercrime gang that holds its victims’ data to ransom, has been disrupted in a rare international law enforcement operation. The news has been confirmed by the gang itself, and US and UK authorities. The operation was run by Britain’s National Crime Agency, the...

Romanian healthcare facilities hit by cyberattack

A ransomware attack has hit over a hundred Romanian healthcare facilities, including dozens of hospitals. The attackers have demanded 3.5 bitcoin, worth over £130,000 to unlock the files. But cyber-officials have claimed the data had been recently backed up, reducing the impact – and...

Global Affairs Canada suffers data breach

Global Affairs Canada (GAC) has suffered a data breach with unauthorised access to personal information. A statement from GAC, a government department which manages diplomatic relations, promotes international trade and provides consular assistance, said: “An unplanned IT outage is...

Browse our latest issue

Intelligent CISO

View Magazine Archive