Magazine Button

Thought Leadership

Challenges for CISOs are spilling over

Ross Brewer, EVP of EMEA and APJ, at SimSpace points out that 2022 was plagued with technological and macro-economic upheavals, many of which will carry forward. Across 2022, several events and trends stand out that will have a material effect on security practices in 2023. The year will also be a challenging and dynamic one […]

Cloud security improving all the time

Frank Kim at SANS Institute explains why cloud providers are in a virtuous circle of security improvements providing a foundation for security professionals to build their cloud security programmes. Rapid innovation is driving organisations to adopt cloud services as critical infrastructure. Cloud acceleration has become a boardroom issue, with non-technical leaders often being vocal proponents […]

How far is threat intelligence data vital to a successful and well-rounded cyber strategy?  

As technology progresses, data breaches continue to skyrocket and this isn’t going to slow down anytime soon. It is predicted that by the end of 2023 the cost of cybercrime is going to hit just under £6.5 trillion. Acquiring threat intelligence data is a primary step in preventing cyberattacks and web scraping should be the […]

Realising the true value of threat intelligence with Recorded Future

Threat intelligence provides valuable information to organisations about potential threats to their network and helps to identify vulnerabilities that may be exploited by attackers. Emad Faraj, Senior Sales Director – META, Recorded Future, discusses the importance of threat intelligence and how it provides valuable information about potential threats as well as how it is key […]

Stopping modern attacks requires XDR with identity

Kapil Raina, Identity Protection Evangelist at CrowdStrike, explains why identity protection is crucial, how this differs from what IAM vendors provide and what organisations need to know when they evaluate security vendors. As organisations have strengthened protection for their networks and endpoints, compromising identities has become a focal point of infiltrating organisations. We’ve seen a […]

Cybersecurity roadmap: Threats proliferate but best practice still works

Zeki Turedi, CTO EMEA, CrowdStrike, discusses the cybersecurity landscape in the months to come and why the way forward depends on your choice of partner, not technology. It’s safe to say that last year was unrelenting on the cybersecurity front and adversaries are only becoming more sophisticated and adopting more advanced techniques and technologies to […]

The Metaverse is the ‘next frontier’ for the cyber industry

When it comes to the Metaverse, it is crucial that security is a top priority or businesses will risk leaving themselves open to attack. Lior Arbel, CTO of Encore, discusses the importance of staying secure in the Metaverse to ensure we reap its potential of revolutionising the way we communicate and conduct business. As new […]

Preparing for a ‘quantum’ world in 2023

Neil Thacker, CISO EMEA at Netskope, says the fact that new standards for post-quantum cryptography are coming is a hugely positive step forward in the constant evolution of security and why the transition to these standards will be one of the biggest transformational challenges facing security teams in the next decade. Every few decades, the […]

Single-vendor SASE will bring data security to every user, app and device

Manny Rivelo, Chief Executive Officer, Forcepoint, explains why security leaders will continue to look to Secure Access Service Edge, or SASE, the convergence of cloud-delivered networking and security. There’s probably a universe out there where everyone’s using just one Zero Trust security solution. But not on this Earth, not yet at least. The trouble is […]

Account takeover fraud… and how to avoid falling victim

Anthony Daniel, Regional Director – Australia, New Zealand and Pacific Islands, WatchGuard Technologies, tells us how cybercriminals exploit victims through account takeover fraud. Cybercriminals target their victims in many different ways, and one of the lesser-known methods is account takeover fraud (ATF). ATF is not new, but it’s a tactic that is being used more aggressively. […]

Browse our latest issue

Intelligent CISO

View Magazine Archive