Analysis

Survey reveals Zero Trust adoption appealing but challenging

A survey from Ericom Software reveals four out of five organizations plan to begin their Zero Trust security solution rollout within 12 months but key challenges complicate adoption. Ericom Software, a leader in cloud...

How understanding your assets can unlock innovation

Cyndi Tackett, Vice President of Product Marketing at Flexera, highlights steps to take as you plan your IT budget for 2022. CIOs and CISOs know all too well the pressures placed on IT infrastructures in the wake of...

Four critical data storage security questions CIOs must ask

Keeping data safe and protecting it from unauthorised access is a critical part of having a robust cybersecurity posture and is a top priority for CIOs and CISOs. Neil Stobart, VP Global Systems Engineering, Cloudian,...

Go Phish: Jameeka Green Aaron, CISO of Auth0

We ‘go phishing’ with Jameeka Green Aaron, CISO of Auth0, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? The most mem...

New research reveals adversaries are accelerating targeted access to critical...

CrowdStrike, a leader in cloud-delivered endpoint and workload protection, has announced the release of the CrowdStrike Falcon OverWatch annual report: Nowhere To Hide, 2021 Threat Hunting Report: Insights from the...

Barracuda research reveals skyrocketing levels of bot traffic

New report from Barracuda explores emerging traffic trends and live examples of bot behavior and detection. Barracuda, a trusted partner and leading provider of cloud-enabled security solutions,...

Browse our latest issue

Intelligent CISO

View Magazine Archive