Magazine Button

Digital Transformation

Why CIOs need a secure strategy for output management

In today’s rapidly changing cybersecurity landscape, it is important that companies invest in a robust defence against digital vulnerabilities – but output management is one area that is often overlooked. This complex environment can be challenging to manage. Mark Chillingworth, European Technology Leadership Writer, Editor & Founder, Horizon CIO Network, offers some insight into how […]


Why identity is the cornerstone of a zero trust architecture

Scott Silver, CEO Integral Partners, part of the Xalient Group, says identity security is now a crucial aspect of cybersecurity. As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity […]


Board members have not received sufficient cyber-resilience training in the past year

According to recent report findings by Bob Semple, Board Intelligence and The Corporate Governance Institute, almost two-thirds of board members have not received adequate support and training regarding cyber-resilience in the past 12 months. The research was conducted from May to July 2023 and included over 250 participants, consisting of chairs, NEDs and executive directors […]


The path to fostering a healthy digital trust with customers, partners and stakeholders 

From the pillars of a healthy digital trust system to the best approach for organisations to build this system with customers, partners and stakeholders, James Bowman, Senior Director of Security Governance and Compliance at Diligent outlines the evolution of digital trust and how Diligent is empowering its clients to manage unforeseen risks, be compliant and […]


Deep Dive: James Bowman, Senior Director Security Governance & Compliance at Diligent


The growing role of CISOs in the future of cybersecurity governance

Sunny Tan, Head of Security for Southeast Asia, BT Group, explains how the evolving role of Chief Information Security Officers (CISOs) is becoming increasingly pivotal in shaping the future of robust cybersecurity governance and aligning it with strategic business objectives. In today’s interconnected world, the importance of robust cybersecurity cannot be overstated. With an ever-expanding […]


BeyondTrust joins AWS ISV Workload Migration Program

BeyondTrust has announced an expansion of its relationship with Amazon Web Services (AWS) by joining the AWS Independent Software Vendor (ISV) Workload Migration Program (WMP). This step reinforces BeyondTrust’s commitment to providing enhanced security solutions for enterprises aiming for a secure and efficient transition to the cloud. The AWS ISV WMP offers advanced tools and […]


Veridas digital authentication solution receives ACCS accreditation

Veridas, a Spanish technology company specialising in digital identity and biometrics, has received accreditation for its Age Estimation Technology from the UK’s Age Check Certification Scheme (ACCS) for Evaluation Assurance Level 2.  The Age Check Certification Scheme (ACCS) is a UKAS-accredited conformity assessment body, comprised of auditors, certification specialists and data protection experts. ACCS independently […]


Cybersecurity Expands Rapidly in Middle East, forging Partnerships with ConnectWise

Dubai, August 10th, 2023 – Cyber Security Speed, a leading global provider of advanced cybersecurity solutions, announces its strategic expansion in the Middle East region and the establishment of pivotal partnerships with key players in the Gulf. This expansion is driven by the company’s commitment to fortifying businesses against evolving cyber threats and delivering cutting-edge […]


Orchestrating data for a secure world

Complex data environments have encouraged as much Digital Transformation as they have opportunities for bad actors to exploit weak security. Molly Presley, Senior Vice President of Marketing, Hammerspace, offers advice on best practices for organisations to protect sensitive information and the importance of data officers. As organisations embrace Digital Transformation, they become more reliant on […]


Browse our latest issue

Intelligent CISO

View Magazine Archive