Magazine Button

Thought Leadership

Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital identity debt dilemma and the ‘debt trap’.  How has the pandemic increased the number of opportunities for cybercriminals to attack? The pandemic has resulted in the acceleration of digitalization in many countries in the Asia […]


How Zero Trust can streamline the challenge of corporate M&A

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us completing the complex IT integrations required by mergers and acquisitions (M&A) processes is fraught with difficulties but many of these issues can be addressed by applying Zero Trust security principles. There has been a spate of corporate mergers and acquisitions (M&A) undertaken worldwide […]


A good anti-ransomware strategy is at the heart of Digital Transformation

Mohamad Rizk, Senior Director, Technical Sales – Middle East, Russia and CIS at Veeam Software, outlines the pillars of a sound security strategy. Digital Transformation is seen as a big investment but is becoming a prerequisite for survival in the current and future landscape. Businesses are now more reliant on digital infrastructure than ever – […]


How much is enough? How to build a targeted and sustainable cybersecurity budget

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at LogRhythm, explores what the right amount of cybersecurity is in order to mitigate priority risks and offers his best practice advice for achieving a targeted […]


How to remain cybersecure with ‘bringing your own devices’ 

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with cyberattacks as of late and why it is therefore essential for organisations to address potential risks before implementing processes such as BYOD. Undoubtedly, the past two years have resulted in a colossal number of enterprises adopting an […]


Why incident response and insurance must learn to be bedfellows

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to cybersecurity – an approach he refers to as one that offers ‘the most effective protection against cyberattacks’. The history books will no doubt […]


Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types of attacks and highlights the importance of adding an extra layer of protection to your business to ensure […]


How Zero Trust can lead the battle against ransomware

Sydney-based Ian Farquhar, Field CTO, Gigamon, tells us how in a world where the workforce has shifted significantly to a ‘work anywhere, work anytime’ model, embracing Zero Trust makes sense. Zero Trust has become a well-recognized framework in the cybersecurity world. SecOps teams are championing this ‘trust no-one’ strategy to support the fight against the […]


The CIO’s role in securing cloud environments and simplifying cloud management

Ensuring security in the cloud is of paramount importance in today’s modern working world. Ishpreet Singh, Chief Information Officer, Qualys, discusses some of the ways CIOs can create business value through the cloud and also how they need to prioritise simplifying the management of their cloud environments in a way that aligns with the business’ […]


Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password security. Cian Heasley, Security Consultant at Adarma: “It’s common for people to resort to simple, easy to remember passwords reused across most, if […]


Browse our latest issue

Intelligent CISO

View Magazine Archive