Analysis

Top 10 considerations when choosing a managed detection and response provider

Gartner has identified managed detection and response (MDR) as the next evolution of threat monitoring and incident response services. Jan van Vliet, VP and General Manager EMEA at Digital Guardian reviews the top...

How to put security at the heart of your DevOps development cycles

Josh Kirkwood, DevOps Security Lead, CyberArk, discusses how to put security at the heart of your DevOps development cycles. The engineering project triangle dictates that organisations will have to sacrifice one of...

Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit...

Proofpoint expert on why your employees might be your biggest cyber-risk

Given the complexity of the modern threat landscape, organisations and enterprises need to re-think their cybersecurity strategies. Adenike Cosgrove, Cybersecurity Strategy, International, Proofpoint, talks to...

Keeper Security: Avoiding poor password practices and data breaches

 The dangers of unsecured passwords are often underrated but the impact of a breach can be overwhelming. That’s why those with security firmly placed at the forefront of their operations, ensure they have adequate pr...

The importance of biometrics in video surveillance for the transport sector

Artificial Intelligence (AI) is being implemented into video surveillance systems in a bid to tackle crime and help reduce roadside deaths and traffic jams. Here, Alexander Belyaev, Technical Director at NNTC,...

Browse our latest issue

Intelligent CISO

View Magazine Archive