Magazine Button

Thought Leadership

Quest Software expert on the five steps required to battle endpoint cybercrime

Ken Galvin, Senior Product Manager at Quest Software, outlines five essential steps CISOs should be taking to protect their endpoints against cybercriminals. It’s no secret that cyberattacks are a growing problem for giant corporations and SMEs alike, and cybercriminals are only getting savvier. While the total number of IT vulnerabilities is decreasing, the number that […]


A cloud built on integrated security

With the cloud services market expected to grow at a rate of 28% over the next five years to top R23 billion by 2023, Ralph Berndt, Director – Sales and Marketing at Syrex, says that South African companies have finally woken up to its potential. Research shows that cloud services have steadily been gaining momentum […]


SANS expert on getting the best value out of security assessments

Assessments such as vulnerability scanning and penetration testing help organisations to find gaps in their defences. But careful consideration must be given ahead of rolling these out. Bojan Zdrnja, SANS Certified Instructor and CTO at INFIGO IS, talks us through the various assessments and how they complement one another. There are many aspects to managing […]


Data processing in cloud environments: Managing security and compliance

Modern enterprises are facing the challenge of achieving robust security and compliance while they leverage their vast stores of data in the cloud. Anurag Kahol, CTO at Bitglass, discusses this challenge and unveils the capabilities that help enable organisations to process cloud data effectively and securely. Today’s data sovereignty regulations mean that data is subject […]


Fortanix expert on how European companies are taking back control of their data in the cloud

When running workloads with sensitive and regulated data in the cloud, organisations are seeking greater options to enable them to protect and control that data themselves. Faiyaz Shahpurwala, Chief Product Officer at Fortanix, tells us how, by taking control of their encryption keys, organisations will be able complete their Digital Transformation journeys and start applying […]


Poll hacks: How cybercriminals aim to disrupt elections

The UK general election is upon us and amongst the bombardment of polarised political news, cybercriminals cast a menacing shadow. These are politically unprecedented times and the UK’s National Cyber Security Centre knows it. David Warburton, Senior Threat Evangelist, F5 Labs talks us through the different forms of cyberattack and how they might manifest themselves […]


Protecting the IoT-driven network – a multi-stage approach

Simon Wilson, CTO HPE Aruba UK and Ireland, gives us invaluable advice on deploying a multi-stage strategy to ensure protection vulnerable IoT-driven networks. The Internet of Things (IoT) is more than just the next stage in technical development. For many businesses it represents a valuable source of data which can be used to gain new […]


Troye Technical Director on extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye Technical Director Kurt Goodall says Citrix offers various choices, from the long-established multi-site to the advanced multi-layered […]


Kaspersky expert on how to decide on your company’s IT security budget

In the modern world, there are a plethora of security products and services to choose from. Businesses can find it daunting to navigate their way through these options to choose the best one. Alexander Moiseev, Chief Business Officer at Kaspersky, outlines the different approaches that companies can take when it comes to planning their IT […]


Gartner: Leveraging automation for modern security

Modern security teams are facing more threats than ever, as well as more pressure to provide business value. Katell Thielemann, VP Analyst at Gartner, tells us why it’s so important that CISOs consider automation tools to balance security with efficiencies. Security and risk leaders must explore automation to provide increased business value and maintain security […]


Browse our latest issue

Intelligent CISO

View Magazine Archive