Magazine Button

Analysis

How to communicate DDoS threats to the board

Executive boards need to understand the severity of potential DDoS attacks to their company networks and prepare accordingly. Ashley Stephenson, CTO, for Corero Network Security, discusses the importance of communicating this to the C-suite for them to respond appropriately with adequate security budgets. Being in the security department isn’t easy. In fact, corporate security practitioners […]


Why data storage is an integral part of a CISO’s IT security strategy

In a recent survey conducted by Dimensional Research, 96% of IT decision-makers reported they are worried about ransomware attacks. Only one in five are very confident they could recover from a ransomware attack. With attacks becoming increasingly sophisticated, CISOs have stepped up protection of their business with prevention solutions, such as firewalls, email security, Identity […]


Study: 79% of European businesses already seeing savings from shift to cloud security

Eight in 10 European businesses that have begun the move towards cloud security have already started to see savings, according to new research published by Netskope. The research, conducted by global research company, Censuswide, polled 700 IT professionals in the UK and Germany to explore how organisations are evolving their network and security strategies. Nearly […]


Four data protection and management trends to watch in 2022

Ivan Pittaluga, CTO at Arcserve, reveals four data protection and management trends to keep an eye on in the year ahead. 1: The attack surface will continue to expand as ways of working evolve. Your attack surface includes all the possible ways an attacker can get into your company’s devices and networks and lock up […]


Safe Security expert makes 2022 cybersecurity predictions

Saket Modi, CEO and Co-Founder, Safe Security, provides us with his cybersecurity predictions for 2022. Predictions overviews: The first phygital catastrophe is coming: A central mission-critical application will go down and create a ripple impact across businesses and for consumers around the world. For example, a hack on a major central system like an Internet […]


Experts discuss how CISOs had to re-evaluate their cybersecurity strategies to protect hybrid workforces

A recent report by Menlo Security, a leader in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ IT decision-makers in the US and the UK, including a third at C-level – looks at attitudes to securing […]


Containers are maturing – Data protection needs to keep pace

Dave Russell, VP, Enterprise Strategy, Veeam, explores the pressing need for data protection to keep pace with the maturation of containers and how businesses can accelerate their modern data protection strategy. Unbeknown to most, containers have been around since the 1970s. But it wasn’t until the advent of Docker in 2013 and Kubernetes in 2014 […]


Near 33 million cyberthreats target users and organisations combined in Kenya

The increase in cyberthreats recorded by Kaspersky (Kaspersky.co.za) in the first half of this year in Kenya amounted to 32.8 million. Compared to similarly prominently targeted countries in the African region the recorded number was on par with South Africa accounting for 31.5 million and near double the number recorded in Nigeria at 16.7 million. […]


Study uncovers trends in breaches, supply chain loopholes and security confidence

Checkmarx, a global leader in developer-centric application security testing (AST) solutions, has unveiled the findings of its new global report, AppSec: The View from Security and Software Development Experts. The report was commissioned by Checkmarx and developed with Censuswide to spotlight the biggest security challenges that application security (AppSec) managers and software developers are facing […]


Hybrid working works best with Zero Trust and zero friction

Joseph Carson, Chief Security Scientist, ThycoticCentrify, explains how a Zero Trust approach can reduce risk without increasing friction for users. Last year we added a new phrase to our vocabulary, ‘working from home’ or WFH. This year, we added another term, ‘hybrid working’, to describe a flexible approach that combines working from home and the […]


Browse our latest issue

Intelligent CISO

View Magazine Archive