Insights

Security analytics – Does your security operations need it?

I frequently get asked by clients whether they should invest in security analytics projects. Over a period of time, I have built up a conceptual framework to put security analytics in the context of overall security...

Policy management to reinforce a robust security platform

Navigating the landscape of enterprise security can be daunting – the threats typically fly under the radar, and the broad array of malware, hacks and data theft shows real innovation. Worse, the level of malicious s...

The contours of a successful encryption strategy

Data is the new age currency and extremely valuable to organisations. However, there is somebody else who also has an eye on this data – the cybercriminal. While you leverage the potential of your organisational...

Ensuring an always-on business during the holiday season

With the vacation season approaching in the Middle East, employees in the region are looking to either fly back to their home countries or to holiday destinations with cooler climes. This does not mean, however, that...

Understanding the common motives behind DDoS cyber attacks

Distributed denial-of-service (DDoS) attacks continue to be one of the most prevalent methods hackers use to disrupt businesses. Involving the use of multiple systems (personal computers, smartphones, etc.), DDoS...

Can you afford $500 per minute of internet downtime?

Many organisations have no clue how much one minute of internet downtime costs them, or haven’t stopped to think about it, says Tom Beinkowski, Director of Product Marketing at Arbor Networks. As a result, they greatly u...

Browse our latest issue

Intelligent CISO

View Magazine Archive