Magazine Button

Analysis

How telecommunications providers can best tackle DDoS attacks

Amr Alashaal, Regional Vice President – Middle East at A10 Networks tells us how telecommunications providers can effectively fortify their defences against the escalating threat of DDoS attacks. There is an increasing incidence of cyberthreats posed to telecommunications providers. There is a definite need for telcos to strengthen their overall security posture and improve resilience […]


Why backup is vital in the fight against ransomware

Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, explains why backup is so important in the fight against ransomware. Ransomware first rose to dominance as cybercriminals’ main weapon of choice way back in 2020. Since then, it has been top of the global security agenda, plaguing businesses, public services and individuals alike. […]


The CISO’s next priority isn’t technology – it’s building a great employee experience

Security operations expert, Leon Ward, VP of Product Management, ThreatQuotient, says it’s time to get real about the people side of cybersecurity automation. In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in […]


Bangladesh introduces ePassport with Veridos

Veridos and the Department of Immigration & Passport (DIP) of Bangladesh have written a success story with the introduction of new ePassport.  Veridos, a leading global provider of identity solutions, and the Department of Immigration & Passport (DIP) of Bangladesh, have written a success story with the introduction of new ePassports. The large-scale project, which […]


Cybersecurity in 2024: Insights from industry leaders

Rick Jones, CEO, DigitalXRAID; Jamal Elmellas, Chief Operating Officer, Focus-on-Security; and Jeremy Ventura, Director, Security Strategy and Field CISO, ThreatX, give us their cybersecurity predictions for 2024. Rick Jones, CEO, DigitalXRAID  Attacks on critical national infrastructure continue to proliferate  Critical National Infrastructure (CNI) continues to be the prize bullseye for cybercriminals and nation-state actors alike. […]


The growing role of CISOs in the future of cybersecurity governance

Sunny Tan, Head of Security for Southeast Asia, BT Group, explains how the evolving role of Chief Information Security Officers (CISOs) is becoming increasingly pivotal in shaping the future of robust cybersecurity governance and aligning it with strategic business objectives. In today’s interconnected world, the importance of robust cybersecurity cannot be overstated. With an ever-expanding […]


The five technology trends affecting the security sector in 2024

Johan Paulsson, CTO at Axis Communications, tells us how 2024’s technology trends, from generative AI to regulatory impacts, are shaping the future of the security sector. Even for those of us who have been working in the technology industry for decades, the pace of change over the past 12 months has been extraordinary. Once again, […]


Ransomware in healthcare: Time for CISOs to build resilience and response

Will Poole, Head of Incident Response at CYFOR Secure, tells us about the escalating ransomware threat to the UK’s healthcare sector and the vital importance of building resilience and enhancing incident response to combat these cyberattacks. The UK’s healthcare sector has been under tremendous strain since the pandemic. As hospitals struggle to clear patient backlogs […]


Why CIOs need to pay attention to API Security in 2024

Nick Rago, Field CTO at Salt Security, discusses the critical role of Chief Information Officers in fortifying API security against the backdrop of increasing cyberthreats and the evolving demands of Digital Transformation. As the world continues to become more digitally driven in business and society alike, Chief Information Officers (CIOs) play a pivotal role as […]


Configuration or customisation? You are not picking ice cream flavours, so choose with care

Morey Haber, Chief Security Officer at BeyondTrust, tells us about the critical choice between customisation and configuration in cloud computing, highlighting its impact on business efficiency and costs. It is a tale as old as IT itself. How do we, the business, procure a solution that does exactly what we need when the likelihood of […]


Browse our latest issue

Intelligent CISO

View Magazine Archive