Magazine Button

Analysis

NSA and CISA publish third instalment of 5G cybersecurity guidance

Enduring Security Framework (ESF) experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published its third instalment of guidance to protect the confidentiality, integrity and availability of data within a 5G core cloud infrastructure. Devices and services connected through 5G networks transmit, use and store an exponentially increasing amount of data. This […]


More than half of UK businesses plan to hire a CISO in the next two years

Fastly, a global Edge cloud platform provider, has researched the biggest security threats facing UK businesses today, and in the next few years, to understand how businesses are looking to future-proof their systems. The research, based on insights from information security and IT professionals across 250 UK companies, revealed that only a quarter of businesses […]


‘Secure, seamless and convenient’: Amazon Payment Services’ business philosophy

The shift to digital commerce has provided consumers with a greater array of services at their fingertips and customers now expect seamless, quality online shopping experiences. Peter George, Managing Director, Amazon Payment Services, highlights how the payment services industry has transformed, why merchants need to keep a close eye on customer experience and how Amazon […]


Seven strategies for CSO cybersecurity survival

As the CSO is tasked with more complex challenges as threats become more sophisticated, they must create a robust cybersecurity model for their organisation, which requires solid planning. Adrian Taylor, VP of EMEA at A10 Networks, offers his best practice advice in the form of seven strategies that he believes will help to ensure an […]


CISOs on the front line: What’s ahead for cybersecurity in 2022

For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defence strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm, takes a look at the threats CISOs will face over the next 12 months and discusses how various […]


How to communicate DDoS threats to the board

Executive boards need to understand the severity of potential DDoS attacks to their company networks and prepare accordingly. Ashley Stephenson, CTO, for Corero Network Security, discusses the importance of communicating this to the C-suite for them to respond appropriately with adequate security budgets. Being in the security department isn’t easy. In fact, corporate security practitioners […]


Why data storage is an integral part of a CISO’s IT security strategy

In a recent survey conducted by Dimensional Research, 96% of IT decision-makers reported they are worried about ransomware attacks. Only one in five are very confident they could recover from a ransomware attack. With attacks becoming increasingly sophisticated, CISOs have stepped up protection of their business with prevention solutions, such as firewalls, email security, Identity […]


Study: 79% of European businesses already seeing savings from shift to cloud security

Eight in 10 European businesses that have begun the move towards cloud security have already started to see savings, according to new research published by Netskope. The research, conducted by global research company, Censuswide, polled 700 IT professionals in the UK and Germany to explore how organisations are evolving their network and security strategies. Nearly […]


Four data protection and management trends to watch in 2022

Ivan Pittaluga, CTO at Arcserve, reveals four data protection and management trends to keep an eye on in the year ahead. 1: The attack surface will continue to expand as ways of working evolve. Your attack surface includes all the possible ways an attacker can get into your company’s devices and networks and lock up […]


Safe Security expert makes 2022 cybersecurity predictions

Saket Modi, CEO and Co-Founder, Safe Security, provides us with his cybersecurity predictions for 2022. Predictions overviews: The first phygital catastrophe is coming: A central mission-critical application will go down and create a ripple impact across businesses and for consumers around the world. For example, a hack on a major central system like an Internet […]


Browse our latest issue

Intelligent CISO

View Magazine Archive