Magazine Button

Insights

Biometric technology revolutionises identity space

The use of biometric technology has taken off in recent years which could largely be down to loopholes in password security becoming more apparent. Benoit Jouffrey, Thales Digital Identity & Security CTO, offers expert insight into the ways biometrics is being utilised across the technology landscape – whether it be in airports, banks or simply […]


Three signs your cybersecurity posture will not protect you from the modern threat actor

Figures have shown that the number of cyber-incidents are rapidly increasing. Gregg Petersen, Regional Director – MEA at Cohesity, offers insight into three signs that suggest a security posture is not up to scratch – discussing the lack of alignment between IT and security, overconfidence in recovery capabilities and equipment and talent gaps. Businesses are […]


Agile IT: The role of the CISO in combatting the risks of the ‘move fast, fail fast’ culture

Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI. Here he discusses the role of the CISO when it comes to balancing organisational agility with the need to ensure security is built into any new product/service from the ground up. GCC governments have staked their […]


Dragos expert on why the energy sector must take a proactive approach to cyberdefence

The energy sector has undergone immense digitalisation in recent years as organisations have adopted digital tools to help achieve their transition towards net zero. But this has also introduced new risks and threats which need to be addressed to stay ahead of sophisticated attackers. Phil Tonkin, Senior Director of Strategy at Dragos, talks us through […]


How much is enough? How to build a targeted and sustainable cybersecurity budget

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at LogRhythm, explores what the right amount of cybersecurity is in order to mitigate priority risks and offers his best practice advice for achieving a targeted […]


How to remain cybersecure with ‘bringing your own devices’ 

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with cyberattacks as of late and why it is therefore essential for organisations to address potential risks before implementing processes such as BYOD. Undoubtedly, the past two years have resulted in a colossal number of enterprises adopting an […]


Why incident response and insurance must learn to be bedfellows

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to cybersecurity – an approach he refers to as one that offers ‘the most effective protection against cyberattacks’. The history books will no doubt […]


Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types of attacks and highlights the importance of adding an extra layer of protection to your business to ensure […]


The CIO’s role in securing cloud environments and simplifying cloud management

Ensuring security in the cloud is of paramount importance in today’s modern working world. Ishpreet Singh, Chief Information Officer, Qualys, discusses some of the ways CIOs can create business value through the cloud and also how they need to prioritise simplifying the management of their cloud environments in a way that aligns with the business’ […]


Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password security. Cian Heasley, Security Consultant at Adarma: “It’s common for people to resort to simple, easy to remember passwords reused across most, if […]


Browse our latest issue

Intelligent CISO

View Magazine Archive