Deep Dive

How does adopting cloud and hybrid environments drive change in managing...

In today’s environment where cyberattacks are likely, it is crucial to review and update your security and identity management systems before it is too late. Denis Dorval, Vice President, International (EMEA...

More than half of UK businesses impacted by supply chain cyberbreaches

More than half (57%) of UK businesses have been impacted because of a cybersecurity/information security incident caused by a third-party vendor or supply chain partner, according to new research published by...

Nearly half of CISOs in the UAE experienced loss of sensitive data in the...

Proofpoint’s annual Voice of the CISO report has revealed that 75% of CISOs in the UAE believe employees leaving the organisation contributed to a data loss incident, a...

What are the security implications of using ChatGPT?

Countries across the globe are wary of the potential cybersecurity implications of latest tech phenomenon that is ChatGPT. In light of recent ChatGPT concerns in the news, Richard Forrest, Legal Director at UK law...

Technologists need a new approach to application security to manage a rapidly...

Joe Byrne, CTO Advisor, Cisco AppDynamics, discusses why integrating application security into Digital Transformation programs is key and why this should be recognised as the foundation for sustainable and accelerated...

Global and regional threat actors targeting online travel and hospitality...

Check Point Research puts a spotlight on the hospitality industry with an underground market for selling flight points, hotel rewards and stolen credentials of airline accounts.   Check Point Research...

Browse our latest issue

Intelligent CISO

View Magazine Archive