Magazine Button

Deep dive

Caverion and Avinor enter major security contract in Norway

Caverion and Norwegian airport operator, Avinor, have signed a framework contract covering the installation and maintenance of access control and video surveillance at all of Avinor’s airports in Norway. The contract extends the partnership started in 2010. The value of the contract is worth roughly €50 million. “The safety of our travellers is Avinor’s highest priority […]


Go Phish: We get to know Charles Poff, CISO, SailPoint

We ‘Go Phish’ with Charles Poff, CISO, SailPoint, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? My most memorable achievement in the cybersecurity industry is around building world-class security programmes from the ground up. It’s not as common as people may […]


Gartner contributor on the five security questions your board will definitely ask

With cyberattacks on organisations a fact of life, Kasey Panetta, on behalf of Gartner, explains how CISOs can deal with the inevitable questions asked by board members seeking reassurance that their company’s risks are being effectively managed. Know how to respond to your board’s most likely security questions. How secure are we? Why do we […]


Digital Guardian expert on protecting your organisation with ethical hacking

Businesses are increasingly utilising the skills of ethical hackers to find vulnerabilities in their networks before the bad guys do. Tim Bandos, VP of Cybersecurity at Digital Guardian discusses the rise of ethical hacking as a defence tactic and how organisations can assess whether it is right for them. The ever-growing and evolving cyberthreat landscape […]


Industry experts discuss how best to ensure the data centre is secure

Ensuring the data centre is secure should be a top priority for CISOs as the consequences of a breach are catastrophic. Industry experts from Vectra and Red Seal outline some of the biggest cyber-risks to data centres and offer their advice on how to ensure this critical infrastructure is protected. What are some of the […]


Why security has yet to move from beyond the ‘castle walls’ – and how to do it

Craig Talbot, VP EMIEA, iboss, looks at what is needed to properly move security to the cloud so that firms can fully gain the benefits of it, with employees protected wherever they may be and whatever service they are using . Most organisations have either shifted core elements of their IT or will do so […]


AccessData expert on the way forward for digital forensics

Digital forensics tools are crucial in the modern world but, as the volume of data grows, it’s an area which is becoming more and more challenging. Tod Ewasko, Vice President of Technical Engineering at AccessData, tells us why existing solutions are falling short and how Artificial Intelligence could herald a new era for digital forensics. […]


Protecting against cyberthreats in the hospitality sector

The hospitality sector is facing up to an increase in cyberattacks and, as an industry known for holding huge amounts of data, it’s critical that CISOs and their teams know where the threats are coming from and how they can be defended against. We hear from Jeff Ogden, General Manager – Middle East and India, […]


MOL Group’s CISO on cyberawareness and securing OT

Gabor Varjas, CISO, Group Information Security, MOL GROUP, a leading integrated oil and gas corporation, talks about the cybersecurity challenges of Digital Transformation and how the company is leveraging RSA Security solutions to help keep cyberthreats at bay. MOL Group is a leading integrated Central and East European oil and gas corporation headquartered in Budapest, […]


Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces are not without their security risks. We spoke to industry experts about some of the biggest cyberthreats and how companies can best address these. What […]


Browse our latest issue

Intelligent CISO

View Magazine Archive