Magazine Button

Thought Leadership

Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of the general fears surrounding this approach to cybersecurity. Even before the pandemic, implementing Zero Trust architecture was at the top of […]


spiderSilk CEO on addressing the challenges of attack surface management for SMEs

Businesses are finding themselves in the unviable position of having to deal with rampant cyberthreats while they push their Digital Transformation strategies forward and continue to navigate the remote workforce environment. Improving cyber-resilience can be a daunting task especially for organisations that have resource constraints due to the pandemic. Having visibility of technology ecosystems, from […]


Vulnerability assessment, penetration testing or red teaming: which is right for your enterprise?

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of defending SOC specialists (blue team). Alexander Zaytsev, Head, Security Assessment, Kaspersky, explains the difference between red teaming and other services including vulnerability assessment and penetration testing. […]


First steps to SASE – A unified digital approach for forward-thinking companies

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the importance of utilising SASE as the demand for simple and cost-effective solutions to help support a long-term remote workforce remain. The […]


Protecting utilities and critical infrastructure from the growing cybersecurity threat

Cyberattacks against critical infrastructure and the utilities market are growing in sophistication and frequency. David Stroud, GM of Europe/APAC, NanoLock Security, discusses why decision-makers in critical infrastructure need to invest in cybersecurity for the OT, now. Cyberattacks against critical infrastructure and the utilities market are growing in sophistication and frequency. From Colonial Pipeline to water […]


Rewriting the rules on resilient infrastructure

Taking the right steps to forming a reliable Business Continuity and Disaster Recovery strategy are firmly placed at the heart of many boardroom discussions. Steve Blow, EMEA Sales Engineering Manager at Zerto, a Hewlett Packard Enterprise company, discusses the importance of building a stronger line of defence when it comes to cybersecurity, and why a […]


Digital identities: How to protect against online fraudsters

As the security landscape continues to evolve, new points of vulnerability are becoming a cause for concern. Anurag Kahol, Founder and CTO at Bitglass, discusses the areas organisations should be paying close attention to when it comes to protecting their data and operations. We live in a connected world where every user and entity has […]


Four critical data storage security questions CIOs must ask

Keeping data safe and protecting it from unauthorised access is a critical part of having a robust cybersecurity posture and is a top priority for CIOs and CISOs. Neil Stobart, VP Global Systems Engineering, Cloudian, discusses the four questions every CIO should be asking when it comes to securing their organisation’s data. With each data […]


Pandemic lessons to enforce long-term IT strategy

The pandemic has been a learning curve for all and businesses have had to evolve in a short space of time. Emma Maslen, VP and GM for EMEA and APAC, Ping Identity, discusses the lessons executives are learning in light of the pandemic and how they’re adapting enterprises to the new normal.  The pandemic has […]


The CISO in 2021: Coping with the not-so-calm after the storm

Keith Bird, Senior Vice President, EMEA, Proofpoint, sheds light on understanding who in an organisation is now most vulnerable to attack, the types of attack they are likely to face – and how everyone, from the CISO to the HR team, has a part to play in keeping those attacks at bay. In the aftermath […]


Browse our latest issue

Intelligent CISO

View Magazine Archive