Analysis

Attivo Networks expert on protecting systems and patients in healthcare

Ray Kafity, Vice President, Middle East, Turkey and Africa at Attivo Networks, discusses why a prevention-only defence is no longer enough to ensure data and patients are safe from cybercriminals.  No industry is i...

‘Cryptojacking dominates but mining mules aren’t aware’ – I...

Phil Richards, CSO, Ivanti, discusses the growing threat of cryptojacking, what it means for the landscape of enterprise security solutions and what organisations need to do in order to face the problem head-on. As we...

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting frameworks, teaches an...

Interview: LogMeIn expert on strengthening password security

Despite weak, stolen or reused passwords being the main cause of breaches, IT executives still lack control over password security in their organisations. With GDPR in force and high-profile breaches now consistently...

Tenable releases study on measuring and managing cyber-risks

Tenable, the cyberexposure company, has released the Measuring and Managing the Cyber Risks to Business Operations Report, an independent study conducted by Ponemon Institute. It found that 60% of organisations globally...

Trend Micro VP on the security challenges facing the multi-cloud

The current debate on the table is the adoption of a multi- or dispersed-cloud approach and what this means to security. According to Trend Micro there are some security factors that need to be considered when...

Browse our latest issue

Intelligent CISO

View Magazine Archive