Configuration or customisation? You are not picking ice cream flavours, so...

Morey Haber, Chief Security Officer at BeyondTrust, tells us about the critical choice between customisation and configuration in cloud computing, highlighting its impact on business efficiency and costs. It is a tale...

Industry responds to Britain’s Sellafield cyberattack denial

British Government denies media reports of cybersecurity attacks on nuclear site Sellafield but Office for Nuclear Regulation admits improvements are required. Meanwhile, industry figures react. The British Government...

Remote workers can have it all

Will Teevan, CEO, Recast Software on balancing employee experience with security. If IT security were a rock and business productivity were a hard place, the typical remote employee today would be caught in the middle...

Cybersecurity in the supply chain: Ensuring digital control over outsourced...

Matheus Jacyntho, Director of Cybersecurity, and André Cilurzo, Director of Data Privacy Solutions and LGPD Compliance, at Protiviti, tell us how to safeguard digital control in the supply chain amid rising...

What’s the biggest lesson you’ve learned in cybersecurity this...

In the ever-evolving landscape of cybersecurity, the lessons learned in a short timeframe can redefine an organisation’s approach to safeguarding its digital assets. As we reflect on the challenges and triumphs...

Security leaders in UAE stress their organisations need to make improvements...

52% of UAE respondents cited gap in technology as contributor to major cybersecurity incident. All UAE-based security leaders who have lived through a recent cyber incident believe that future prevention hinges on the...

Browse our latest issue

Intelligent CISO

View Magazine Archive