Analysis

Seven cyberintelligence insights for a more secure business

Cyberthreat intelligence (CTI) involves the collection, evaluation, verification and distribution of information about ongoing and emerging cyberthreats and attacks against network assets and infrastructure. It is...

CyberArk expert – ‘Protecting CNI starts with securing social...

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a major cause for concern in the last 12...

The surveillance dilemma – how to manage capacity and maintain security

In the UK alone, there are between 4 million and 5.9 million CCTV surveillance cameras protecting the public, their property and helping to prevent crime and bring criminals to justice. But this ongoing growth brings ...

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they aren’t already, become a non-negotiable a...

Cloud implementations growing but strategies lack security

Private, public and hybrid clouds are growing in popularity as lift and shift cloud apps are making migration easier for businesses. Christian Mahncke, Enterprise Business Development at Routed, a vendor neutral cloud ...

Large number of CIOs fear IoT performance issues could derail operations

While the Internet of Things (IoT) is propelling companies into the digital revolution, like anything else, it comes with its security concerns. Several experts talk to us about the security issues it could pose and...

Browse our latest issue

Intelligent CISO

View Magazine Archive