Magazine Button

Analysis

Aligning Zero Trust with the Essential Eight

The recent spate of cyberattacks against Australian organisations has caused many to reconsider their cybersecurity strategies and enhance their Zero Trust models. Amritha Saravanan, IT Security Evangelist, ManageEngine, discusses the importance of Zero Trust and how it aligns with the Australian Cyber Security Centre (ACSC)’s Essential Eight Maturity Model. The COVID-19 pandemic has stimulated a major […]


Yellow.AI expert on improving e-commerce through an omnichannel experience

E-commerce dependence on digital communication has drastically elevated since the pandemic. With digital now at the heart of e-commerce, how can businesses cut ties with traditional communications and embrace the best software to enhance their customer experience? We speak to Neil Barman, Chief Growth Officer for Yellow.AI on how an omnichannel experience can keep up […]


Cloudflare expert on Zero Trust and the future challenges and opportunities organisations can expect 

As organisations attempt to carry out broad network transformations, moving to a Zero Trust architecture is a critical initial step. Mohit Bijlani, Head of UK/IRE at Cloudflare, tells Intelligent CISO’s Mrigaya Dham about how Cloudflare’s approach differs from other vendors and the most significant risks it helps mitigate.       Zero Trust is a widely discussed […]


79% of IT leaders see a worrying ‘protection gap’ between tolerable data loss and how IT is protecting their data

Veeam Software, a leader in backup, recovery and data management solutions that deliver modern data protection, has revealed that UK and Irish businesses are headed for a data protection emergency. Nearly eight in 10 (79%) of UKI IT decision-makers and professionals disclosed gaps between their data dependency, backup frequency, SLAs and ability to get back […]


Report reveals almost half of board members globally feel unprepared for a cyberattack

We take a look at the relationship between CISOs and the boardroom and how both parties can strive to improve it, better aligning their business priorities. The report reveals that while 69% of board members report seeing eye-to-eye with their CISO, only 51% of CISOs feel the same. Proofpoint, a leading cybersecurity and compliance company, […]


Forescout’s Vedere Labs reveals the riskiest connected devices in enterprise networks

Forescout’s Vedere Labs has unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks. The research uncovers what makes them so risky and how to mitigate cyber-risks affiliated with them. The growing number and diversity of connected devices in every industry presents new challenges for organisations to understand and manage the […]


The key to modernising IT security

With an increasing cyberthreat level and continued moves towards hybrid working, organisations face the ever-present challenge of meeting their cybersecurity needs. We hear from Helen Kruger, CEO of Troye, regarding ways to ensure a secure hybrid working environment without slowing business productivity. The attack surface is expanding fast as more employees start working from more […]


Deep Dive: Mohamed Ibrahim, Business Development Director for OT cybersecurity at Trend Micro MEA, Technical Partner of TXOne Networks


University of Technology Sydney report offers blueprint for regulation of facial recognition technology

A report from the University of Technology Sydney (UTS) Human Technology Institute has outlined a model law for facial recognition technology to protect against the harmful use of this technology, but also foster innovation for public benefit. Australian law was not drafted with the widespread use of facial recognition in mind. Led by UTS Industry […]


Deep Dive: Mike O’Sullivan, CTO at Infinox


Browse our latest issue

Intelligent CISO

View Magazine Archive