Magazine Button

Thought Leadership

SentinelOne expert on defending the endpoint in the age of remote working

With many employees now working from home, organisations are exposed to a vastly increased attack surface and must re-assess their endpoint security strategies to ensure they are equipped for this new environment. Tamer Odeh, Regional Director at SentinelOne in the Middle East, tells us how enterprises can best improve their endpoint security and why prevention […]


Reinventing security postures in the COVID work from home era

A report by Sectigo looks at how companies have modified their cybersecurity, compliance and digital identity practices for our suddenly evolved workspaces. Tim Callan, Senior Fellow, Sectigo explains how working from home has changed the cybersecurity landscape. COVID-19 and the ‘new business normal’ has transformed enterprise IT and cybersecurity practices more than any other event […]


Digital Forum – European cybersecurity trends

In this edition of our Digital Forum, Javvad Malik, Security Awareness Advocate, KnowBe4; Jon Garside, Director – Product Marketing, Securonix and Robert Byrne, Field Strategist, One Identity, discuss cybersecurity trends in Europe and offer advice to CISOs.


What impact has COVID-19 had on the data breach landscape?

Cybercriminals have taken advantage of the disruption and uncertainty caused by COVID-19. Phillip Larbey, Managing Principal for Europe, Middle East and Africa at Verizon Enterprise Solutions, lays out the cybertrends which have most impacted businesses during this time. Since we launched the Verizon Business 2020 Data Breach Investigations Report (2020 DBIR) in May, we have […]


Cybersecurity in the COVID era: Guarding against phishing

While employees have, in the main, adapted to working from home, the rapid move to a remote workforce as a result of Coronavirus has left many organisations highly susceptible to cyberattacks. Andrew Morris, Managing Consultant at Turnkey Consulting, explains how companies can protect themselves against phishing. One of the most common threats is phishing, a […]


Ivanti expert on solving problems at scale with hyper-automation tools

With the rapid shift to remote work, many organisations have been forced to understand how to manage and secure infrastructure that ‘transcends traditional boundaries’. Chris Goettl, Senior Director, Product Management for Security, Ivanti, talks us through the challenges CISOs are facing right now, introduces us to Ivanti Neurons and highlights how it is helping security […]


Mimecast expert on adopting a defence in depth approach for email security

Email is the top communications tool used by modern organisations, with many now shifting from on-premise to cloud-based. And while this has numerous business benefits, it also means that security must be top of mind. Werno Gevers, Regional Manager – Mimecast Middle East, tells us why organisations should look to adopt a defence in depth […]


Why digital distancing needs to be the ‘new normal’ in Australia

Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon Black, introduces us to the concept of ‘digital distancing’ and tells us how to practice it.   COVID-19 has shaken up Australian workplaces and has forced many organizations to move to remote working to contain the spread of the virus. In an effort to practice ‘social distancing’, […]


Tips for evaluating and implementing managed detection and response

The recent shift to remote working due to the pandemic has driven more companies to embrace managed detection and response services (MDR). Jan van Vliet, EMEA VP and GM at Digital Guardian, explains why MDR services are important in today’s world. Building a cybersecurity team with the skills to leverage today’s sophisticated detection and response […]


Think 3,2,1 to protect your business against ransomware

Ransomware is a serious threat that should not be underestimated. Rick Vanover, Senior Director of Product Strategy, Veeam, tells us huge attacks have resulted in major organizations and businesses being unable to carry out responsibilities that are critical to their operations. The war on ransomware is real. In the past few years, this form of […]


Browse our latest issue

Intelligent CISO

View Magazine Archive