Thought Leadership

Why digital identity is the cornerstone of trust in modern business

Johan Fantenberg, Product and Solution Director, Ping Identity, talks trust, threats and the role of the digital I.D.  In a world where commerce, communication and collaboration are increasingly taking place online, ...

The Digital Horizon – Tracking security trends

Bashar Bashaireh, VP Middle East, Türkiye and North Africa at Cloudflare, discusses new challenges amid a changing cybersecurity landscape. The digital landscape is undergoing a rapid transformation, driven by several ...

Strengthening the core pillars of cyber-resiliency

Sam Woodcock, Director of Cloud Strategy and Enablement at 11:11 Systems, emphasises that the ever-evolving threat landscape demands a mindset of continuous improvement to stay agile and effectively respond to the...

Protecting your devices for 25 years and beyond: Celebrating the TPM

Joe Pennisi, President of the Trusted Computing Group (TCG), tells us how TCG and its Trusted Platform Module (TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence...

Secure by Design: A continued priority in 2025 and beyond

Jim Richberg, Global Field CISO, Fortinet, says Secure by Design is a foundational approach to product development that vendors must embrace, ensuring that security is a foundational component of the design and ...

International Women’s Day 2025: Tech leaders discuss how to accelerate action

The theme to this year’s International Women’s Day is ‘Accelerate Action.’ We asked some of the leading women in the technology industry what more needs to be done break down barriers and create opportunities for women a...

Browse our latest issue

Intelligent CISO

View Magazine Archive