Magazine Button

Thought Leadership

Matrix42 CEO on enabling a smart and secure digital workspace

Organisations around the world are now relying on digital tools to help them deliver positive experiences for both their employees and end users, particularly given the shift to remote working brought about by the COVID-19 pandemic. Here, Oliver Bendig, CEO, Matrix42, talks us through the challenges and pain points for customers, as well as how […]


Proactively preventing cyberattacks and keeping the business operational with threat hunting

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure. What is threat hunting and why is it relevant to CISOs? Threat hunting […]


Why ‘castle-and-moat’ protection is no fairy tale

Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more distributed infrastructure and new applications and workloads exposing a larger attack surface, means that perimeter security, while still an important element within an enterprise’s […]


Fortinet expert on the threats impacting education cybersecurity

The threat landscape is continuously evolving with the adoption of innovative technology to meet vast demands. This is especially true in the education sector. As academic institutions adopt new technologies to sustain hybrid and remote learning and are constantly targeted by threat actors, leaders in education must stay one step ahead by taking proactive approaches to managing […]


Securing the cloud: Why speed is of the essence

Organisations across the Middle East are increasingly adopting cloud applications and platforms. Given the remote nature of modern workforces, it’s important they do not overlook security. Arie de Groot, Senior Director Middle East at Netskope, tells us why organisations should be prioritising cloud security and how Netskope is helping its customers to achieve this. Recent […]


Experts discuss whether passwords are still fit for purpose

Cybersecurity professionals discuss how far we can rely on the use of passwords to secure our most valuable information, and how organisations should be securely operating until we can develop a more reliable method to replace passwords. The concept of a password has existed for millennia and while the idea of them has remained the […]


The priorities that should be covered in every CISO’s budget

To be able to succeed in the post COVID-19 era, CISOs will need to reallocate their budgets and begin planning for strategies and offerings to safeguard their organisation. Adam Gordon, Country Manager ANZ at Varonis, discusses some of the budget priorities for CISOs in 2021, from ransomware detection technology to remote data security. 2020 was […]


CIOs are responsible for promoting innovations that support their remote workforce

As the world becomes more hybrid and people adapt to working remotely, CIOs must be aware of how to mitigate the expanding threat landscape that has intensified as a result. Jonathan Bridges, Chief Innovation Officer at Exponential-e, says CIOs must explore technologies which ensure employees are not being held back at home by the likes of poor connectivity […]


Security is about more than the network

Lynton Lubbe, CS and NGS Business Practice Lead, Westcon-Comstor Sub-Saharan Africa, on Zero Trust and why building a comprehensive security posture is more than just the network. Given the normalisation of a distributed work environment, organisations have had to rethink their approach to cybersecurity. Dealing with an exponential increase in network complexity, managing the myriad […]


Genetec expert on unblurring the lines between physical and cybersecurity

Modern organisations use a range of smart physical security solutions to keep their people and assets safe – but it’s important that they also acknowledge that these security tools can be an entry point for threat actors to gain access to corporate networks. Christian Morin, Chief Security Officer and Vice President Integration and Cloud Services, […]


Browse our latest issue

Intelligent CISO

View Magazine Archive