Magazine Button

Thought Leadership

CISOs on the front line: What’s ahead for cybersecurity in 2022

For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defence strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm, takes a look at the threats CISOs will face over the next 12 months and discusses how various […]


How to communicate DDoS threats to the board

Executive boards need to understand the severity of potential DDoS attacks to their company networks and prepare accordingly. Ashley Stephenson, CTO, for Corero Network Security, discusses the importance of communicating this to the C-suite for them to respond appropriately with adequate security budgets. Being in the security department isn’t easy. In fact, corporate security practitioners […]


Why data storage is an integral part of a CISO’s IT security strategy

In a recent survey conducted by Dimensional Research, 96% of IT decision-makers reported they are worried about ransomware attacks. Only one in five are very confident they could recover from a ransomware attack. With attacks becoming increasingly sophisticated, CISOs have stepped up protection of their business with prevention solutions, such as firewalls, email security, Identity […]


Prepare, defend, recover, repeat – The vicious cybersecurity cycle in 2021

It’s fair to say that 2021 has been one of the most challenging years on record for business leaders and their organisations. Ed Williams, EMEA Director of SpiderLabs, Trustwave, reflects on the past 12 months and suggests how we can move forward with strong cyber hygiene in place. 2021 has been a year of significant […]


Experts discuss how CISOs had to re-evaluate their cybersecurity strategies to protect hybrid workforces

A recent report by Menlo Security, a leader in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ IT decision-makers in the US and the UK, including a third at C-level – looks at attitudes to securing […]


Stay local, stay safe: Complying with EU data regulations

Investing in a local data residence, or partnering with a vendor that already has a local data storage facility, offers many benefits for organisations. Simon Godfrey, EMEA Senior Sales Director, Secureworks, explores why EU businesses prefer to have their security telemetry data stored locally so that it complies with GDPR and other regulations. The location […]


Ransomware: Why least privilege is key for prevention

Ransomware is universally recognised as one of the top risks that organisations are facing today, with attackers exploiting fears and uncertainty around COVID-19 to boost their rate of success. David Higgins, EMEA Technical Director at CyberArk, tells us which tools and solutions organisations should consider investing in to protect themselves and highlights the best practice […]


The evolution of network security: Why organisations need a new approach

There is no doubt that the network perimeter has changed as workforces are now spread across office, home and remote environments. Traditional approaches to cybersecurity are no longer adequate. Here, Brendan Maccarron, Palo Alto Networks Channel Manager, Southern Africa, Westcon-Comstor, and Kylie Wilkinson, EMEA Vendor Product Manager at Westcon-Comstor for Palo Alto Networks, highlight how […]


Biometrics – The next frontier in the cybersecurity fight

Businesses in the modern world must utilise security procedures like biometrics to stay ahead of the competition. Grahame Williams, Identity & Access Management Director at Thales, discusses how biometrics is being used to change the identity and access management game. The cyber world is a constant battle. As businesses look to innovate and progress, there […]


Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of the general fears surrounding this approach to cybersecurity. Even before the pandemic, implementing Zero Trust architecture was at the top of […]


Browse our latest issue

Intelligent CISO

View Magazine Archive