Deep Dive

Protecting your devices for 25 years and beyond: Celebrating the TPM

Joe Pennisi, President of the Trusted Computing Group (TCG), tells us how TCG and its Trusted Platform Module (TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence...

Simplifying security for complex cloud environments

A cloud-first vision across the Middle East is driving the rapid adoption of cloud technologies, but organisations must ensure their cybersecurity strategy is equipped for this modern infrastructure. Walid Natour,...

Strengthening telecom cybersecurity: Expert strategies for resilient networks

As cyberthreats grow more sophisticated, telecom providers must strike a delicate balance between robust cybersecurity and uninterrupted service. In this feature, four industry experts share their insights on how...

The future of Identity Management: Passwordless, Zero Trust and AI-driven...

With Okta at the forefront of shaping the future of Identity Management, its solutions are designed to help organisations stay secure, compliant and ahead of emerging cyberthreats as digital-native companies grow and...

Strengthening defences against the evolving threat of ransomware

Shobhit Gautam, Staff Solutions Architect for EMEA at HackerOne, explores emerging ransomware attack trends and offers insights into strengthening organisational defences. He evaluates the effectiveness of current...

Exploring security vulnerabilities through the lens of an ethical hacker 

Giving us a view of security from an alternate angle, ethical hacker, Alexander Pick, highlights the methods, challenges and trends in device hacking.  What inspired you to start exploring and hacking hardware?  ...

Browse our latest issue

Intelligent CISO

View Magazine Archive