Magazine Button

Industry Expert

Opening the lines of communication between CISOs and the board

As the threat landscape widens, CISOs and the board must work closely and effectively to ensure they remain focused on the same goal: building a company-wide security culture and protecting their people and data. Andrew Rose, Resident CISO, Proofpoint, says that while it’s encouraging to see that cybersecurity is finally a focus of conversations across […]


Deep Dive: Tamer Odeh, Regional Sales Director at SentinelOne


Deep Dive: Jamil Abu Aqel, Head of Mandiant Systems Engineering for MEA and Emerging Region at Google Cloud


How far is threat intelligence data vital to a successful and well-rounded cyber strategy?  

As technology progresses, data breaches continue to skyrocket and this isn’t going to slow down anytime soon. It is predicted that by the end of 2023 the cost of cybercrime is going to hit just under £6.5 trillion. Acquiring threat intelligence data is a primary step in preventing cyberattacks and web scraping should be the […]


How businesses can stay safe from undetected cyberattacks

Despite the growing awareness of the necessity for more advanced cybersecurity, firms are still falling foul of attacks which are undetected when they arrive and can stay for years. Adam Blake, CEO and Founder of ThreatSpike discusses the reasons why businesses are missing the mark and how they can keep one step ahead of cyberattacks. In today’s […]


BlueFort expert on the crucial role of intelligence-led visibility in defending your external attack surface

The rise of cloud-based technology has allowed a fast-paced expansion of external attack surfaces and as cybersecurity starts to rise on the C-level priority list, it has become clear organisations must think about risk mitigation in new ways. Josh Neame, CTO at BlueFort, tells us how stripping back these systems and taking an intelligence-led visibility […]


Stopping modern attacks requires XDR with identity

Kapil Raina, Identity Protection Evangelist at CrowdStrike, explains why identity protection is crucial, how this differs from what IAM vendors provide and what organisations need to know when they evaluate security vendors. As organisations have strengthened protection for their networks and endpoints, compromising identities has become a focal point of infiltrating organisations. We’ve seen a […]


Preparing for a ‘quantum’ world in 2023

Neil Thacker, CISO EMEA at Netskope, says the fact that new standards for post-quantum cryptography are coming is a hugely positive step forward in the constant evolution of security and why the transition to these standards will be one of the biggest transformational challenges facing security teams in the next decade. Every few decades, the […]


Breaking the myths of the Zero Trust model and how it can protect your organisation

Dave Russell, Vice President of Enterprise Strategy, Veeam Software, explains how Zero Trust can protect organisations and elaborates on how building good habits among your employees is a critical aspect of its use.  A ‘Zero Trust’ security model is one of the latest buzzwords in the cybersecurity industry. In short, a Zero Trust model means you […]


Deep Dive: Mohamed Ibrahim, Business Development Director for OT cybersecurity at Trend Micro MEA, Technical Partner of TXOne Networks


Browse our latest issue

Intelligent CISO

View Magazine Archive