Magazine Button

Deep dive

Industry experts discuss how best to ensure the data centre is secure

Ensuring the data centre is secure should be a top priority for CISOs as the consequences of a breach are catastrophic. Industry experts from Vectra and Red Seal outline some of the biggest cyber-risks to data centres and offer their advice on how to ensure this critical infrastructure is protected. What are some of the […]


Why security has yet to move from beyond the ‘castle walls’ – and how to do it

Craig Talbot, VP EMIEA, iboss, looks at what is needed to properly move security to the cloud so that firms can fully gain the benefits of it, with employees protected wherever they may be and whatever service they are using . Most organisations have either shifted core elements of their IT or will do so […]


AccessData expert on the way forward for digital forensics

Digital forensics tools are crucial in the modern world but, as the volume of data grows, it’s an area which is becoming more and more challenging. Tod Ewasko, Vice President of Technical Engineering at AccessData, tells us why existing solutions are falling short and how Artificial Intelligence could herald a new era for digital forensics. […]


Protecting against cyberthreats in the hospitality sector

The hospitality sector is facing up to an increase in cyberattacks and, as an industry known for holding huge amounts of data, it’s critical that CISOs and their teams know where the threats are coming from and how they can be defended against. We hear from Jeff Ogden, General Manager – Middle East and India, […]


MOL Group’s CISO on cyberawareness and securing OT

Gabor Varjas, CISO, Group Information Security, MOL GROUP, a leading integrated oil and gas corporation, talks about the cybersecurity challenges of Digital Transformation and how the company is leveraging RSA Security solutions to help keep cyberthreats at bay. MOL Group is a leading integrated Central and East European oil and gas corporation headquartered in Budapest, […]


Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces are not without their security risks. We spoke to industry experts about some of the biggest cyberthreats and how companies can best address these. What […]


Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers – in the world of technology, these are their ‘users’. Knowing the users is of critical importance in aiding providers to manage and mitigate risks such […]


Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to a number of industry experts who offer some best practice advice to CISOs about how to tackle this challenge.     Why is it important to […]


Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies on online services to power its learning and teaching environment, a greater number of devices belonging to students or staff connected to the network are […]


Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting frameworks, teaches an organisation how to get started with it and how to implement high-fidelity techniques for advanced threat hunting. Cyberthreat hunting is a critical […]


Browse our latest issue

Intelligent CISO

View Magazine Archive