Magazine Button

Top Stories

Dr. Martens modernises its global data protection and retention strategy with 11:11 Systems

Organisations are modernising their security strategies and ensuring they operate with a resilient Business Continuity plan to prepare for potential challenges. Here, Dan Morgan, Global Head of Cloud and Infrastructure at Dr. Martens, offers insight into the organisation’s business priorities; security, resiliency and global availability of cloud, and explains how it worked with 11:11 Systems […]


Cloudflare expert on Zero Trust and the future challenges and opportunities organisations can expect 

As organisations attempt to carry out broad network transformations, moving to a Zero Trust architecture is a critical initial step. Mohit Bijlani, Head of UK/IRE at Cloudflare, tells Intelligent CISO’s Mrigaya Dham about how Cloudflare’s approach differs from other vendors and the most significant risks it helps mitigate.       Zero Trust is a widely discussed […]


Sophos’ MDR service launches compatibility with third-party cybersecurity technologies

The Sophos solution integrates telemetry from third-party endpoint, firewall, cloud, identity, email, and other security solutions with Sophos Adaptive Cybersecurity Ecosystem for improved threat detection and response. Sophos, a global leader in innovating and delivering cybersecurity- As-a-Service, has launched new third-party security technology compatibilities with Sophos Managed Detection and Response (MDR) to better detect and […]


Michigan recognized for IT excellence in national rating

The State of Michigan was recognized by the Center for Digital Government (CDG) as one of the top-performing states in the country for its use of technology to improve and secure government services. The CDG’s biennial Digital States Survey awarded Michigan with an A grade, the highest honor. The state has received an A grade […]


Zscaler advances enterprise data security with industry-first zero configuration data protection

Zscaler, a leader in cloud security, has announced new data protection innovations that build upon a rich heritage of securing data across all cloud apps for data in motion, data at rest and BYOD assets with unprecedented accuracy and scale. The new advancements accelerate data protection programmes from months to hours with zero configuration for […]


79% of IT leaders see a worrying ‘protection gap’ between tolerable data loss and how IT is protecting their data

Veeam Software, a leader in backup, recovery and data management solutions that deliver modern data protection, has revealed that UK and Irish businesses are headed for a data protection emergency. Nearly eight in 10 (79%) of UKI IT decision-makers and professionals disclosed gaps between their data dependency, backup frequency, SLAs and ability to get back […]


Report reveals almost half of board members globally feel unprepared for a cyberattack

We take a look at the relationship between CISOs and the boardroom and how both parties can strive to improve it, better aligning their business priorities. The report reveals that while 69% of board members report seeing eye-to-eye with their CISO, only 51% of CISOs feel the same. Proofpoint, a leading cybersecurity and compliance company, […]


£150,000 of electronic devices stolen from the BBC over past three years

The BBC, the national broadcaster of the United Kingdom, has reported over £150,000 worth of electronic devices stolen over the past three years, including microphones, laptops and other devices, according to official figures. The data, which was retrieved by the Freedom of Information Act (FOI) and analysed by the Parliament Street think tank, observed the […]


Forescout’s Vedere Labs reveals the riskiest connected devices in enterprise networks

Forescout’s Vedere Labs has unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks. The research uncovers what makes them so risky and how to mitigate cyber-risks affiliated with them. The growing number and diversity of connected devices in every industry presents new challenges for organisations to understand and manage the […]


Surge in dark data a growing danger for organisations

Dark data represents the biggest potential cybersecurity exposure for businesses, according to a cybersecurity edition of the DealMaker Meter report, Understanding Risk: The Dark Side of Data. Dark data is defined as data that a company has collected but no longer needs – ranging from outdated customer information to old employee records – dark data […]


Browse our latest issue

Intelligent CISO

View Magazine Archive