Magazine Button

Thought Leadership

Why incident response and insurance must learn to be bedfellows

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to cybersecurity – an approach he refers to as one that offers ‘the most effective protection against cyberattacks’. The history books will no doubt […]

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types of attacks and highlights the importance of adding an extra layer of protection to your business to ensure […]

How Zero Trust can lead the battle against ransomware

Sydney-based Ian Farquhar, Field CTO, Gigamon, tells us how in a world where the workforce has shifted significantly to a ‘work anywhere, work anytime’ model, embracing Zero Trust makes sense. Zero Trust has become a well-recognized framework in the cybersecurity world. SecOps teams are championing this ‘trust no-one’ strategy to support the fight against the […]

The CIO’s role in securing cloud environments and simplifying cloud management

Ensuring security in the cloud is of paramount importance in today’s modern working world. Ishpreet Singh, Chief Information Officer, Qualys, discusses some of the ways CIOs can create business value through the cloud and also how they need to prioritise simplifying the management of their cloud environments in a way that aligns with the business’ […]

Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password security. Cian Heasley, Security Consultant at Adarma: “It’s common for people to resort to simple, easy to remember passwords reused across most, if […]

Eight guiding principles for Zero Trust in banking and financial services today

Security leaders will be familiar with the term ‘Zero Trust’ – an approach crucial as vulnerabilities and attacks are becoming more damaging to organisations. Hila Meller, BT Vice President Security, Americas, EMEA and APAC, discusses some of the guiding principles for Zero Trust in banking and financial services. When it comes to adopting a Zero […]

The myth of security versus convenience

The ease of access and convenience to workplace systems is often observed as a ‘trade-off’ for security, but according to Rashid Ali, Enterprise Solutions Manager at WALLIX, this is nothing but a myth. Here, he discusses this common misunderstanding in workplace security, in further detail. With the rise of remote working, having access to the […]

Four principles for improving digital supply chain resilience

David Smith, Senior Security Consultant at Evalian, discusses the key considerations for improving supply chain security and ultimately reducing the risk of a supply chain attack impacting your company. Supply chain attacks have become a mainstay in the headlines, with high-profile security incidents like the Kaseya and SolarWinds breaches impacting thousands of organisations worldwide.  A […]

How AI can drive a quantum leap in cybersecurity automation

The capabilities of automation tools have not gone unnoticed in the cybersecurity market. Here, Tim Wallen, LogPoint Regional Director, UK&I, discusses what is needed for AI, Machine Learning and RPA to transform cybersecurity. 2020 was a wakeup call for security professionals globally as cybercriminals capitalised on the uncertainty and changes induced in the pandemic era. […]

Security Service Edge (SSE) and the future of cloud security

Sundaram Lakshmanan, CTO of SASE Products at Lookout, explains what SSE is, its three core principles and how it differs from SASE, as well as how enterprises can get the most out of SSE with the integration of endpoint security, and advanced users and data protection capabilities. To run an efficient business that enables your […]

Browse our latest issue

Intelligent CISO

View Magazine Archive