Magazine Button

More News

Proofpoint expert on how companies can holistically tackle data loss prevention

As CISOs work to mitigate cyber risks posed to their businesses, pursuing the shift from detection and recovery to prevention has never been more important. Adenike Cosgrove, VP Cybersecurity Strategy EMEA at Proofpoint tells Intelligent CISO about ransomware, data loss prevention and why today’s top cybersecurity threats are people-centric.  Proofpoint’s 2023 State of the Phish […]

EkkoSense: Continuous AI and ML optimization with Cooling Advisor

Cooling Advisor is one of EkkoSoft Critical’s most powerful capabilities, giving you access to the industry’s first fully-embedded, AI-driven cooling advisory tool. We believe it’s just like having your own in-house optimization consultant available 24×7! Powered by machine learning insights from over 50 million data points, Cooling Advisor draws on the deep cooling optimization best […]

Introducing Imperva Waiting Room

Imperva Waiting Room enables you to control traffic during peak periods or when your site is undergoing maintenance, by placing your customers into a virtual queuing system where they remain until it is their turn to access your website.

WithSecure joins CyberPeace Builders Program

WithSecure, formerly known as F-Secure Business, is offering the support of its cybersecurity professionals to vulnerable populations serviced by non-governmental organisations (NGOs) groups through the CyberPeace Builders program. The program, managed by the CyberPeace Institute, connects cybersecurity professionals with NGOs. According to information from the CyberPeace Institute, only one in 10 NGOs provide regular cybersecurity […]

Tesserent Academy launches free ‘100 Day Challenge’ to accelerate cybersecurity skills

Tesserent Limited has launched its first Tesserent Academy ‘100 Day Challenge’. This is a free fully funded program designed to accelerate cybersecurity training for students and graduates. Tesserent Academy is investing over AU$250,000 to develop cybersecurity talent from diverse backgrounds, age cohorts and genders to accelerate the future pipeline of talent. The recent acquisition of […]

Veeam named top data protection and recovery solution worldwide

Veeam Software has announced that it has been ranked the number one global provider by International Data Corporation (IDC) in its latest IDC Semiannual Software Tracker, 2022H2 for data replication and protection software. The tracker reports that Veeam, with a year-over-year growth rate (not adjusted for constant currency) of 8.1%, grew faster than the other […]

Integrating threat intelligence into your cybersecurity strategy: Insights from Proofpoint’s State of Phish Report

As organisations attempt to optimise their business strategies, understanding threat intelligence has never been more important. Bert Skaletski, Resident CISO for EMEA, Proofpoint, tells Intelligent CISO about how Proofpoint’s State of Phish Report can help organisations better protect themselves in 2023 and beyond. Why is threat intelligence important and why should CISOs integrate this into […]

F5: How AI can be blended into IT automation security 

The evolution of AI within the cybersecurity landscape has led to the discovery and mitigation of new cyber-events and attack vectors. The result is a rush by organisations to build more automated and intelligent security defences using techniques like Machine Learning, Deep Learning and Natural Language Processing. In this article, Lori MacVittie, F5 Distinguished Engineer, explains […]

Building your managed Network-as-a-Service (NaaS) practice with Aruba

How the Aruba Edge Services Platform enables MSPs to build and deliver a competitive, differentiated portfolio of managed networking services that meet customer needs.

NetWitness expert on the changes of the NIS2 Directive and achieving protection against cyber threats 

As organisations attempt to protect against cyber threats, understanding cybersecurity frameworks is a critical initial step. Stefano Maccaglia, EMEA Practice Manager Incident Response at NetWitness, tells Intelligent CISO Africa about the expanding categories of threat actors, and how their practical approach towards cyber incidents differs from other vendors.  One of the key changes in the NIS2 Directive is […]

Browse our latest issue

Intelligent CISO

View Magazine Archive