Magazine Button

Industry Expert

Global security leaders outline four key trends for how to transform a SOC

Mimecast has published its latest Cyber-resilience Think Tank report which looks at the benefits and challenges of keeping a Security Operating Centre in-house versus outsourcing it. This latest report digs into the human element of team organisation, various cybersecurity strategies and the tools and technology underpinning SOCs. Mimecast Limited, a leading email and data security […]


Regaining control of CNI in the face of cyberthreats

A cyberbreach on Critical National Infrastructure (CNI) could have a catastrophic impact on the national economy. Joseph Carson, Chief Security Scientist at Thycotic, explains the impact of CNI attacks and how to regain control. Not all cyberthreats are created equal. While every attack will be bad news for someone, some security incidents can impact the […]


Why a partner-led approach is critical to effective cybersecurity

Cybersecurity is a specialist field that requires focus and dedicated resources. Rentia Booysen, Product Manager at Westcon-Comstor Sub-Saharan Africa, explains how relying on an experienced partner ecosystem becomes critical to put cybersecurity in place. Research by Accenture and the Ponemon Institute indicates most business leaders feel their cybersecurity risks are growing in momentum as the […]


IT decision makers concerned over cost of quantum defence

Companies are already preparing to deal with quantum threats. Tim Hollebeek, Industry and Standards Technical Strategist, DigiCert, explains how Quantum Key Distribution (QKD) has been hailed as a potentially effective solution to quantum threats. Quantum computing is on its way, as are quantum threats. Such technology in the wrong hands promises to break most of […]


Data Management: How can CIOs balance risk with business gain in the age of GDPR?

GDPR has forced business to take a much broader look at data management. John Pocknell, Senior Market Strategist at Quest, explains how to better manage data and how it will make a difference to companies. In the age of the Internet, data has become one of the most valuable commodities to almost every business. Not […]


A new cost for network blindness: derailed mergers and acquisition deals

An undisclosed data breach can dramatically alter any merger or acquisition. Mike Campfield, VP, Global Security Programs, ExtraHop, explains how cyber audits are now standard practice and how companies make recommendations based on the strength of a cybersecurity programme. Enterprise Security is never just a problem for the security team. With every breach it creeps […]


It’s time to get misconfiguration in the cloud under control

A misconfigured storage bucket in the cloud can often go unnoticed but it can result in a cyberattack. Mike Campfield, VP, Global Security Programs, ExtraHop, explains what the problem is and how companies can address it. Misconfigurations are killing data security in the cloud and you can find evidence of self-inflicted wounds in almost every […]


Payment Card Industry security compliance doesn’t necessarily equal security

Experts continually highlight how security needs to be a top priority in a connected world but how often is it top of the list for companies? Andrew Kilbourne, Managing Director at Synopsys, said the percentage of companies passing security testing has fallen and, to add to this, compliance does not always lead to security. It’s […]


Five critical elements for any cybersecurity awareness programme

To combat mobile cyber threats, organisations must educate employees about the risks associated with accessing critical business apps on personal devices. Doros Hadjizenonos, Regional Sales Director at Fortinet,  explores the five critical elements that CISOs should include in any cybersecurity awareness training. While nearly nine in 10 companies not only allow, but actually rely on their employees to access […]


A view of how DDOS weapons have evolved

Anthony Webb, EMEA Vice President at A10 Networks, talks us through the evolution of DDOS weapons in the last year and provides valuable advice to avoid becoming a victim. Throughout 2019, DDoS attacks continued to grow in frequency, intensity and sophistication. However, the delivery method of using infected botnets and vulnerable servers to perform crushing […]


Browse our latest issue

Intelligent CISO

View Magazine Archive