Magazine Button

Industry Expert

The CISO challenge of budgeting

As a result of the impact that COVID-19 has had on businesses, CISOs are under more pressure than ever to make informed decisions on where they invest their budget. Dietrich Benjes, VP and GM APAC, Qualys, explains why CISOs need to conduct a thorough assessment of their current security posture and evaluate how security can […]

Go Phish: Jameeka Green Aaron, CISO of Auth0

We ‘go phishing’ with Jameeka Green Aaron, CISO of Auth0, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? The most memorable was watching Orion EFT 1 launch and land. It was a full circle moment for me. My team worked […]

The CISO in 2021: Coping with the not-so-calm after the storm

Keith Bird, Senior Vice President, EMEA, Proofpoint, sheds light on understanding who in an organisation is now most vulnerable to attack, the types of attack they are likely to face – and how everyone, from the CISO to the HR team, has a part to play in keeping those attacks at bay. In the aftermath […]

Why EDR should be a key component of your overall cybersecurity strategy

Today’s sophisticated cyberthreats require new, advanced approaches to prevention and defence. Endpoint Detection and Response (EDR) is one such tool which is helping to keep organisations secure. Here, Bogdan Carlescu, Acting Cybersecurity Professional and Product Marketing Director at Bitdefender, highlights how CISOs can make EDR a key component of their overall cybersecurity strategy, as well […]

Go Phish: Gareth Williams, VP of Secure Communications and Information Systems, Thales

We ‘go phishing’ with Gareth Williams, VP of the Secure Communications & Information Systems Business of Thales, UK, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? Thales has undergone a massive transformation in the business over the last five years, […]

What it means to be a cybersecurity vendor for enterprise clients: Five key elements

Evgeniya Naumova, VP, Global Sales Network, Kaspersky, on the challenging market conditions and how the cybersecurity vendor is helping its enterprise customers to navigate the security challenges in tough times. The year 2020 was a game changer. All business had to adapt to a new reality and address new challenges. The only question was: how […]

Security is about more than the network

Lynton Lubbe, CS and NGS Business Practice Lead, Westcon-Comstor Sub-Saharan Africa, on Zero Trust and why building a comprehensive security posture is more than just the network. Given the normalisation of a distributed work environment, organisations have had to rethink their approach to cybersecurity. Dealing with an exponential increase in network complexity, managing the myriad […]

New study highlights 100% rise in nation state cyberattacks in last three years

HP urges businesses to protect the endpoint. A new report highlights that the enterprise has become the most common target, as nation states take aim at organisations with high-value IP, such as technology and pharmaceutical firms. HP has announced the findings of a new study – Nation States, Cyberconflict and the Web of Profit – […]

A pandemic of cyberattacks

Babur Khan, Technical Marketing Engineer – Enterprise Security, A10 Networks, on the rising incidents of cyberattacks. In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus is continuously evolving and presenting new challenges. In addition to the direct effects of the COVID-19 pandemic, we also saw a […]

Checklist for selecting best data protection appliance for your enterprise

Nikhil Korgaonkar, Regional Director, Arcserve India and SAARC, shares four common use cases for data protection appliances and the capabilities to look for in potential platforms to find one that matches your business objectives best.  Enterprises are under huge pressure to manage the unstoppable data growth while protecting complex workloads from IT disasters. Now whether […]

Browse our latest issue

Intelligent CISO

View Magazine Archive