Analysis

Checklist for selecting best data protection appliance for your enterprise

Nikhil Korgaonkar, Regional Director, Arcserve India and SAARC, shares four common use cases for data protection appliances and the capabilities to look for in potential platforms to find one that matches your...

Ensuring effective IT security in a world of Edge Computing

Joseph Salazar, Technical Marketing Manager, and Vlado Vajdic, Solutions Engineer, both of Attivo Networks, explain how it is essential to take a multi-layered approach to security when adopting Edge Computing. Edge...

Security tips for start-ups from Kaspersky

From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial act...

Report finds UK tech sector unprepared for cyberattacks

According to research conducted by the Ponemon Institute and commissioned by Keeper Security, more than half of IT and technology firms in the sector (59%) say their budgets are still insufficient to cover their...

Creating a secure culture

Invest in the technology, embed the security, but don’t forget that people are your most important asset. Security. This is a word that can make a grown CFO tremble and an entire security operations centre (SOC) c...

Pandemic IT security survey exposes critical gap

Lynx Software has announced the results of its pandemic cybersecurity survey designed to capture US employees’ sentiment toward how seriously companies have taken cybersecurity since the start of COVID-19. Companies h...

Browse our latest issue

Intelligent CISO

View Magazine Archive