Magazine Button

Industry Expert

Why the bad rap of traditional protection measures needs a rethink

Vibin Shaju, VP Solutions Engineering EMEA at Trellix, discusses the importance of operating with the most ideal endpoint security platform and how to establish it effectively. Nowadays everybody wants to talk about how cybersecurity is a detection and mitigation game rather than one of protection. While these arguments have undeniable merit, signature-based protection is not […]


Deep Dive: Bert Skaletski, Resident CISO, EMEA at Proofpoint


Deep Dive: Andrew Rose, Resident CISO, EMEA at Proofpoint

In this interview, Arrey Bate speaks to Andrew Rose, the Resident CISO for EMEA at Proofpoint. Andrew provides valuable insights into the crucial topic of creating a security culture and breaking the attack chain. He also shares effective strategies for organizations to enhance the human element in their security measures and sheds light on best […]


Cloud cybersecurity best practices for CISOs and CIOs

With the cloud now widely adopted, many still appear to be unaware of the vulnerabilities they’re encountering and the steps to take to prevent them. Amit Tailor, Director, Systems Engineering, Palo Alto Networks, says that cloud security is possible but will only be achieved by taking systematic steps to strengthen your cloud cybersecurity posture.  It’s undeniable that rapid cloud […]


The role of the board of directors in cyber-risk management

Organisations require a team effort to adequately protect themselves against cyber-risks, more now than ever. Phil Venables, CISO, Google Cloud, observes the role of the board in cyber-risk management and assesses the principles it should adopt to ensure the company is prepared to deal with emerging and cybersecurity threats. Cyber risk has become a major […]


How is the cost-of-living crisis causing one-in-10 Brits to engage in ‘illegal or illicit’ online behaviour and how can this be avoided?

Eskenzi PR & Marketing, a leading global PR and Marketing agency for the cybersecurity industry, has released further results from the 2023 Cost of Living Crisis Survey, which aimed to understand how Britons – and the cybercriminals who target them – have been coping with the seemingly ever-worsening cost-of-living crisis.   The results of the survey […]


Franciscan Health utilises Fortinet Security Fabric Solutions to immunise IoT medical devices against cyberattacks 

Franciscan Health, a leading healthcare institution, takes a proactive approach to protect its IoT medical devices from the rising threat of cyberattacks. Leveraging the capabilities of Fortinet Security Fabric Solutions, Franciscan Health fortifies its network infrastructure and establishes robust security measures, ensuring the immunisation of critical medical devices against potential cyberthreats. Chuck Christian, Vice President […]


Reclaiming data privacy: Empowering users in the age of social media

Kaus Phaltankar, CEO and Co-founder of Caveonix, believes that the lack of privacy concern in the US is because most consumers aren’t aware of how their personal data is being used across social platforms – and they don’t realise it until it has a direct impact on them. Here he draws attention to the alarming reality of data privacy and the ways […]


Go Phish: Rik Ferguson, VP of Security Intelligence, Forescout Technologies

We ‘go phishing’ Rik Ferguson, VP of Security Intelligence, Forescout Technologies, who tells us about life inside and outside the office.  What would you describe as your most memorable achievement in the cybersecurity industry? There have been so many: induction into the Infosecurity Hall of Fame; first time on live TV; seeing my name in […]


Why are professionals remaining overly attached to password-based security despite growing risks and widespread frustration?

Beyond Identity, a leading provider of passwordless, phishing-resistant MFA, has released the findings of new industry research which found that most cloud professionals remain overly attached to the use of passwords despite their inherent security vulnerabilities, value as a target for threat actors and widespread frustrations around password hygiene requirements.   The survey of more than […]


Browse our latest issue

Intelligent CISO

View Magazine Archive