Analysis

Trend Micro expert on email hackers being defeated by AI

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats, making it one of the most popular vectors in a hacker’s arsenal. The thing with h...

Cybereason honeypot project reveals cyber-risk to energy sector

The energy sector – and the ICS (industrial control systems) that run the pumps, switches and meters responsible for powering homes and businesses – have long been on the radar of cyberattackers. Cybersecurity firm Cyb...

‘We’re at cyberwar’ – study reveals views on...

Venafi, a leading provider of machine identity protection, has announced the results of a survey of 515 IT security professionals’ views on cyberwar and nation-state security. The survey was conducted at the Black Hat c...

Forcepoint expert on four biggest misconceptions about cloud security

The widespread adoption of cloud solutions has been driven by the myriad of associated benefits offered, such as flexibility, scalability and remote access. However, Christo van Staden, Forcepoint Regional Manager:...

Industry experts on how best to secure the endpoint

Endpoint security is a key consideration for all CISOs and security professionals facing the reality that cyberattacks are now considered inevitable. Industry experts discuss how they think CISOs should best assess how...

IDC expert on why security is vital to organisational success

Security is as vital to organisational success as technology and people, says Mark Walker, Associate Vice President of Sub-Saharan Africa at International Data Corporation (IDC). Search for security on Google. The ...

Browse our latest issue

Intelligent CISO

View Magazine Archive