Deep Dive

AI-generated attacks: Can businesses fight back with AI?

As Artificial Intelligence evolves, so too do the tactics of cybercriminals exploiting it to launch faster, more complex cyberattacks. In this feature, three industry experts examine how threat actors are leveraging...

SITA and NEC Unite to Propel Global Digital Identity Movement in Travel...

In a significant move set to shape the future of international travel, air transport technology giant SITA and biometric authentication leader NEC Corporation have announced a strategic collaboration aimed at...

Protecting your devices for 25 years and beyond: Celebrating the TPM

Joe Pennisi, President of the Trusted Computing Group (TCG), tells us how TCG and its Trusted Platform Module (TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence...

Simplifying security for complex cloud environments

A cloud-first vision across the Middle East is driving the rapid adoption of cloud technologies, but organisations must ensure their cybersecurity strategy is equipped for this modern infrastructure. Walid Natour,...

Strengthening telecom cybersecurity: Expert strategies for resilient networks

As cyberthreats grow more sophisticated, telecom providers must strike a delicate balance between robust cybersecurity and uninterrupted service. In this feature, four industry experts share their insights on how...

The future of Identity Management: Passwordless, Zero Trust and AI-driven...

With Okta at the forefront of shaping the future of Identity Management, its solutions are designed to help organisations stay secure, compliant and ahead of emerging cyberthreats as digital-native companies grow and...

Browse our latest issue

Intelligent CISO

View Magazine Archive