Blogs

AI is everywhere, ‘oh yes it is’

Panto is a Christmas tradition for our family. Every year, for as long as I can remember, we’ve embraced each predictable element of the British institution that transforms theatres across the country over the festive s...

Ransomware in healthcare: Time for CISOs to build resilience and response

Will Poole, Head of Incident Response at CYFOR Secure, tells us about the escalating ransomware threat to the UK’s healthcare sector and the vital importance of building resilience and enhancing incident response...

Global and regional threat actors targeting online travel and hospitality...

Check Point Research puts a spotlight on the hospitality industry with an underground market for selling flight points, hotel rewards and stolen credentials of airline accounts.   Check Point Research...

Cloud security improving all the time

Frank Kim at SANS Institute explains why cloud providers are in a virtuous circle of security improvements providing a foundation for security professionals to build their cloud security programmes. Rapid innovation...

Vulnerability assessment, penetration testing or red teaming: which is right...

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of defending S...

The CISO in 2021: Coping with the not-so-calm after the storm

Keith Bird, Senior Vice President, EMEA, Proofpoint, sheds light on understanding who in an organisation is now most vulnerable to attack, the types of attack they are likely to face – and how everyone, from the CISO t...

Browse our latest issue

Intelligent CISO

View Magazine Archive