Case Studies

Cultivating a successful risk management strategy for secure operations

Assessing and addressing risk is essential to the role of a CISO as well as being a core factor in minimising disruption to business operations. Martin Redmond assists CIOs and CISOs with implementing relative...

Telecom giant scales out security for 5G-rollout with A10 Networks Thunder...

When a Middle East telecom giant needed at-scale protection to safeguard its 4G and 5G mobile networks, it turned to A10 Networks. The telecom leader wanted a high-performance, scalable andagile solution for its...

Brunel University London steering a new cyber path and investing early

Mick Jenkins MBE, Chief Information Security Officer at Brunel University, had a core vision to build a unified cybersecurity platform. He explains his cybersecurity strategy. Before I joined Brunel University as...

Why CISOs need to work together against organised cyberthreats

Mark Ferguson, CISO of Bombardier, discusses the benefits for CISOs of building a strong network of connections and communicating with security leaders to create security strategies that will stand up to increasingly...

Airbus Cybersecurity strengthens its threat intelligence with ThreatQuotient

Airbus Cybersecurity has strengthened its threat intelligence with ThreatQuotient. We hear how ThreatQ has allowed the company to offer a richer threat intelligence service that has more context and is faster – with the r...

Noon enhances access management with OneLogin

OneLogin is an identity platform for secure, scalable and smart experiences that connect people to technology. With the OneLogin Trusted Experience Platform, customers can connect all of their applications, identify...

Browse our latest issue

Intelligent CISO

View Magazine Archive