Magazine Button

Insights

Why the board needs to give their CISO a seat at the table

Digital Transformation offers businesses many competitive advantages and investing in it means that organisations can stay on top of their game. Galina Antova, Co-founder and Chief Business Development Officer at Claroty, discusses the CISO’s role and how they can be a key part of implementing change when it comes to communicating cyber-risks and preparing for […]


Security is a journey, not a destination: Cybersecurity’s past, present and future

Security is a journey, not a destination. Between new technologies, emerging threats and seismic shifts in the cultural landscape, nothing stays static for long. In that spirit, we caught up with Scott Behm, Keysight Technologies’ Chief Information Security Officer, to get his take on leading enterprise security teams, how 2020 shook things up and what […]


Security planning on a budget for CISOs

CISOs are under more pressure than ever to ensure their organisations thrive in order to survive, and investing in the right technology has a key part to play. David Higgins, EMEA Technical Director, CyberArk, offers his best practice advice and says that a massive budget increase isn’t required, but a change of approach. CISOs, security […]


Overcoming common email security misconceptions

As workforces adapt to the new work from home model, it has never been more important for organisations to invest in their email security. Brian Pinnock, Cybersecurity Expert, Mimecast, discusses the stark findings behind the company’s research that reveal just how important it is to ensure email security is up to scratch. The past 18 […]


Six key characteristics of a modern secure web gateway

Key security solutions like secure web gateways (SWGs) are crucial for organisations to overcome the challenges associated with today’s workforce. Anurag Kahol, Founder and CTO at Bitglass, discusses the benefits of using secure web gateways and the factors that should be considered when selecting a modern SWG solution. The second quarter of 2021 marks a […]


Securing the Internet of Things in the 5G era

Simon Bryden, Manager Consulting Systems Engineering at Fortinet, discusses why an integrated and holistic security architecture is necessary to offer the visibility required to see and identify IoT devices, as well as offering prevention and detection components needed to mitigate the effects of an attack. Internet of Things (IoT) devices are everywhere. From consumer devices […]


Protecting from the cyber kill chain evolution

As cybercriminals ramp up their approach, organisations must implement an effective incident response plan to identify, analyse and mitigate attacks. Chris Vaughan, AVP – Technical Account Management, EMEA Tanium, discusses going back to basics and putting an efficient plan in place. Since the beginning of 2020, there has been an acceleration in cybercrime as criminals […]


Mind the gap: Five most common weaknesses in a business’ cybersecurity

Victor Lough, Cyber Security & Advanced Digital Services Business Lead, Schneider Electric, points out the common weaknesses in a business’ defence system and discusses the importance of operating with fully mature cybersecurity. When you combine the fact that two in five UK businesses have faced cyberattacks over the past year, with the growing accessibility of […]


Proactively preventing cyberattacks and keeping the business operational with threat hunting

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure. What is threat hunting and why is it relevant to CISOs? Threat hunting […]


Why ‘castle-and-moat’ protection is no fairy tale

Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more distributed infrastructure and new applications and workloads exposing a larger attack surface, means that perimeter security, while still an important element within an enterprise’s […]


Browse our latest issue

Magazine Cover

View Magazine Archive