Magazine Button


Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of the general fears surrounding this approach to cybersecurity. Even before the pandemic, implementing Zero Trust architecture was at the top of […]

First steps to SASE – A unified digital approach for forward-thinking companies

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the importance of utilising SASE as the demand for simple and cost-effective solutions to help support a long-term remote workforce remain. The […]

Protecting utilities and critical infrastructure from the growing cybersecurity threat

Cyberattacks against critical infrastructure and the utilities market are growing in sophistication and frequency. David Stroud, GM of Europe/APAC, NanoLock Security, discusses why decision-makers in critical infrastructure need to invest in cybersecurity for the OT, now. Cyberattacks against critical infrastructure and the utilities market are growing in sophistication and frequency. From Colonial Pipeline to water […]

Rewriting the rules on resilient infrastructure

Taking the right steps to forming a reliable Business Continuity and Disaster Recovery strategy are firmly placed at the heart of many boardroom discussions. Steve Blow, EMEA Sales Engineering Manager at Zerto, a Hewlett Packard Enterprise company, discusses the importance of building a stronger line of defence when it comes to cybersecurity, and why a […]

Digital identities: How to protect against online fraudsters

As the security landscape continues to evolve, new points of vulnerability are becoming a cause for concern. Anurag Kahol, Founder and CTO at Bitglass, discusses the areas organisations should be paying close attention to when it comes to protecting their data and operations. We live in a connected world where every user and entity has […]

Pandemic lessons to enforce long-term IT strategy

The pandemic has been a learning curve for all and businesses have had to evolve in a short space of time. Emma Maslen, VP and GM for EMEA and APAC, Ping Identity, discusses the lessons executives are learning in light of the pandemic and how they’re adapting enterprises to the new normal.  The pandemic has […]

Data centre security; fighting on two fronts

Data centres are at the heart of technology operations and hold the keys to some of the most confidential information on earth. Nick Smith, Business Development Manager at Genetec, offers some of his best practice advice for addressing the cyber and physical security of data centre facilities today, to ensure data centre leaders remain vigilant. […]

What procedures should data centre leaders have in place to ensure their facilities are physically secure?

Genetec, a leading technology provider of unified security, public safety, operations and business intelligence solutions, has announced that Seagate Technology Holdings, a world leader in data storage and enterprise storage systems, has deployed Genetec Security Center to secure its global campuses and regional offices. At the heart of this large-scale global deployment is the Genetec unified security platform which […]

How to build a more cyber-secure construction industry

CISOs have a responsibility to strategically layer up security across the organisation in order to defend against cyberattacks. Bharat Mistry, Technical Director at Trend Micro, discusses the steps organisations in the construction industry should take to achieve a comprehensive risk-based cybersecurity strategy. Security in the construction industry has always been important, but historically it meant […]

Would criminalising ransomware payments be a positive move for businesses?

Preventing and preparing for ransomware attacks can prove extremely challenging for businesses. Zeki Turedi, CTO EMEA, CrowdStrike, analyses the threat of ransomware and its complex capabilities, and discusses the way forward for businesses and society. When there are difficult problems to solve — like the massive surge in ransomware attacks over the last three to […]

Browse our latest issue

Intelligent CISO

View Magazine Archive