Magazine Button

Analysis

Palo Alto Networks to protect healthcare devices with Medical IoT Security

Palo Alto Networks has announced Medical IoT Security – one of the most comprehensive Zero Trust security solutions for medical devices – enabling healthcare organisations to deploy and manage new connected technologies quickly and securely. Zero Trust is a strategic approach to cybersecurity that secures an organisation by eliminating implicit trust by continuously verifying every user […]


What does the cybersecurity landscape look like for the year ahead?

New research has revealed that over a third (36%) of the UK’s CIOs and CTOs say that rolling out IT security and information safeguarding initiatives are the key strategic priorities for their business in 2023 and beyond. To meet this objective, 30% are actively hiring to boost their stretched IT teams. However, just under half […]


Chief data officers leading the digital revolution

Using data to inform business decisions has led to a new role — the chief data officer. Here, John Salt, Co-founder of OnlyDataJobs, shares the three skills needed to succeed in the chief data officer role and explores the attributes that future candidates will have. The rise of the chief data officer role demonstrates the […]


Lack of IT skills greatest data security challenge Australian enterprises face

Rubrik, the Zero Trust data security company, has announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge, Australian cybersecurity leaders face in securing their organisation’s data was “insufficient talent in IT and SecOps”, cited by […]


What is the modern day CISO prioritising as cyber-risks continue to surge?

New research has revealed that over a third (36%) of the UK’s CIOs and CTOs say that rolling out IT security and information safeguarding initiatives are the key strategic priorities for their business in 2023 and beyond. To meet this objective, 30% are actively hiring to boost their stretched IT teams. However, just under half […]


Lookout data shows credential theft mobile attacks on the rise in US Government agencies

Lookout, an endpoint to cloud security company, has released its 2022 Government Threat Report which examines the most prominent mobile threats affecting federal, state and local governments in the United States. Lookout data reveals mobile phishing and device vulnerability risk within US government agencies has increased since 2021. According to a Lookout analysis of data […]


Gartner highlights four ways chief supply chain officers can respond to inflation 

As inflation rates rise in economies around the world, and a recession might be looming, there are four ways chief supply chain officers (CSCOs) can prepare their leadership response over the next months, according to Gartner.  “While CSCOs primarily focus on developing strategy and enabling organisational capabilities, the economic headwinds they experience these days call […]


How next-generation email threats push security to its limits

Here, Toni El Inati – RVP Sales, META & CEE, Barracuda Networks, identifies 13 different types of email threats including the most challenging for users and security systems to detect which are Business Email Compromise (BEC), conversation hijacking and brand impersonation. The first email phishing attacks were reported in 1995. Almost three decades later, email-based […]


How XDR reduces the total cost of security operations

Ransomware is becoming more prevalent and organisations are having to rethink their security strategies to stay protected. Hussam Sidani, Regional Vice President, Middle East and Turkey, Cybereason, explores the costs of combatting ransomware and how to mitigate it. Ransomware is on the loose, with an attack occurring every 11 seconds on average and causing one […]


Breaking the myths of the Zero Trust model and how it can protect your organisation

Dave Russell, Vice President of Enterprise Strategy, Veeam Software, explains how Zero Trust can protect organisations and elaborates on how building good habits among your employees is a critical aspect of its use.  A ‘Zero Trust’ security model is one of the latest buzzwords in the cybersecurity industry. In short, a Zero Trust model means you […]


Browse our latest issue

Intelligent CISO

View Magazine Archive