Magazine Button

Thought Leadership

What keeps CISOs up at night?

The pressures that CISOs face are rising, but it must be remembered they are human. Neil Thacker, Chief Information Security Officer for EMEA at Netskope, shares his thoughts about the role of the CISO and the optimistic future ahead. With an increasingly sophisticated threat landscape and an ever-expanding attack surface, the list of things keeping […]


Fighting back against cybersecurity burnout

Andrew Hollister, CISO, LogRhythm, explains how addressing burnout to reduce cyber-risk should be treated as seriously as any other business risk and considers how CISOs can put priorities into perspective. In a rapidly expanding threat environment, the challenge for Chief Information Security Officers (CISOs) isn’t just evolving threat tactics but making sense of overwhelming security […]


Emerging digital identity trends for 2024

John Cullen, Strategic Marketing Director Digital Identity at Thales, outlines some key predictions for 2024 in the sphere of digital identities. Verifying one’s identity plays a central role in how today’s society operates – both in online and offline scenarios. Be it at passport control before boarding a flight, renting accommodation, buying alcohol from a […]


How can CISOs ensure their cyber spending really counts?

Assessing the year ahead, budgets are getting tighter and cyberattacks are becoming more relentless. It’s vital for organisations to avoid cutting corners and save money in the long-term by not opening themselves up to attackers and ransom demands. Paul Dant, Senior Director of Cybersecurity Strategy & Research at Illumio, shares his insight. It’s a good time to […]


Navigating cyberattacks: Strategies for resilient recovery

Majd Sinan, Security Leader, Gulf, Levant and Pakistan at IBM, tells us how minimizing the impact of ransomware attacks demands a shift in mindset. Imagine your organisation was just hit by a ransomware attack, and all your data is suddenly inaccessible. Your files have been encrypted by a hacker, who is now demanding a hefty […]


How to pivot a PII strategy against the growing threat of cyberattacks

Stockholm-based Petra Tesch, Chief Information Officer, Vizrt, asks how can a company ensure its Personally Identifiable Information (PII) is adequately protected? Cyberthreats are increasing and becoming more serious by the day, so it’s crucial for organisations to stay one step ahead when safeguarding their digital assets. Personal identification information (PII) sits on the firing line, […]


Why CIOs need a secure strategy for output management

In today’s rapidly changing cybersecurity landscape, it is important that companies invest in a robust defence against digital vulnerabilities – but output management is one area that is often overlooked. This complex environment can be challenging to manage. Mark Chillingworth, European Technology Leadership Writer, Editor & Founder, Horizon CIO Network, offers some insight into how […]


How Zero Trust has evolved with the times

Dave Russell, Vice President, Enterprise Strategy at Veeam, tells us how the idea of Zero Trust has had to evolve with the times. Around 18 months ago, I was writing about the ‘endless journey’ to Zero Trust. I used the word ‘endless’ because Zero Trust is a mindset rather than a product or a destination […]


Five tips to stay out of the phishing trap

Bashar Bashaireh, Managing Director, Middle East and Turkey, Cloudflare, outlines key recommendations that will help organisations stay out of the phishing trap. Email is the most exploited business application. It is the primary initial attack vector for cybersecurity incidents, and contains vast amounts of trade secrets, PII, financial data and other sensitive matters of value […]


The importance of Nudge Theory in email security

Robin Bell, CISO at Egress, provides insight into the essential components of robust email security strategies. It’s estimated that individuals make 35,000 decisions every day according to psychologists, or one decision every two seconds. That’s not to say that each decision has a big impact, most are small and often instinctive like taking a sip […]


Browse our latest issue

Intelligent CISO

View Magazine Archive