Insights

Email security is still evolving: Understanding new threats and defensive...

Email technology has weathered countless changes yet remains a cornerstone of communication. However, its widespread use and inherent reliability make it an attractive target for cybercriminals, driving them to devise...

What strategies should CISOs employ to maintain robust network security?

Network security has become a top priority for businesses in the digital age, where cyberthreats continue to evolve in complexity and scale. As organisations expand their digital footprint, they face an increasing...

Insider Threat Awareness Month: Views from the frontline

Experts from Protegrity, Securin, Traceable, Zerto, FoxIt and Datadobi offer their unique perspective on the current state of insider threats. Clyde Williamson, Product Management, Innovations,...

Strengthening sustainability and security

BEEAH Group is the Middle East’s leading sustainability pioneer, renowned for groundbreaking environmental innovations and smart solutions for future-ready cities. Recognising sustainability and technology as...

Endor Labs releases comprehensive report on open source software dependency...

New research offers CIOs and CISOs analysis of trends and dangers in open source software dependencies – and ways to prioritize the greatest risks. Endor Labs has released The 2024 Dependency Management Report...

Join our webinar ‘Building a culture of vigilance through cybersecurity a...

Establishing a strong company culture of cybersecurity vigilance is always a top priority for CISOs and their organisations – but it’s not always easy to achieve. Cybersecurity Awareness Month –...

Browse our latest issue

Intelligent CISO

View Magazine Archive