Magazine Button

Analysis

Report finds cloud more complex to manage than on-prem

Thales report reveals Australian businesses find cloud privacy and data protection more complex to manage than on-prem. A report from Thales reveals Australian businesses find cloud privacy and data protection more complex to manage than on-prem.   Over half of Australian businesses (53%) believe cloud privacy and data protection is more challenging to manage than […]


Trellix report finds business services top target of ransomware attacks

A report by one of the industry’s leading tech giants, Trellix, explores the cybersecurity trends and attack methods from the first quarter of 2022. The report details the evolution of Russian cybercrime, email security and threats to critical infrastructure.   Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has released […]


Agile IT: The role of the CISO in combatting the risks of the ‘move fast, fail fast’ culture

Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI. Here he discusses the role of the CISO when it comes to balancing organisational agility with the need to ensure security is built into any new product/service from the ground up. GCC governments have staked their […]


The evolving cyberthreat landscape and the benefits of AI and Machine Learning

Derek Manky, Chief, Security Insights & Global Threat Alliances, FortiGuard Labs; and Jonas Walker, Security Strategist with Fortinet’s FortiGuard Labs, discuss the changing threat landscape and the role of Artificial Intelligence and Machine Learning in fighting today’s cyberthreats. Nowadays, threat actors are leaning on new tools and techniques to improve the efficiency of their attacks. […]


The importance of securing and protecting the endpoint

Lee Wrall, Director and Co-founder of Everything Tech, outlines some of the ways IT managers can better manage their endpoint protection such as updating antivirus programs and moving to the cloud. Whether it’s connected to fixed servers which hold your business’ data or it reaches up into the cloud for the good stuff that keeps […]


Deep Dive: Richard Meeus, Director of Security Technology and Strategy EMEA, Akamai


Deep Dive: Zac Warren, Chief Security Advisor, EMEA, Tanium


Deep Dive: John Shier, Senior Security Expert at Sophos


Why educating and empowering your end-user is key to achieving robust cybersecurity

Benjamin Corll, VP of Cybersecurity at Coats, discusses the organisation’s work with Zscaler which offered improved visibility and secured its Industry 5.0 transformation. He also explains why it’s important to empower your people, because they ‘are not our weakest link, but our best sensors’. Coats, the world’s leading industrial thread manufacturer, has adopted the Zscaler […]


Trellix finds business services top target of ransomware attacks in 2022 report

The summer report details an evolution of Russian cybercrime, email security and threats to critical infrastructure. Trellix, the cybersecurity company delivering a future of extended detection and response (XDR), has released The Threat Report: Summer 2022, analyzing cybersecurity trends and attack methods from the first quarter of 2022. The report also features research from Trellix […]


Browse our latest issue

Intelligent CISO

View Magazine Archive