Insights

Red Hat expert on the top five ways that DevSecOps isn’t like sport

Mike Bursell, Chief Security Architect, Red Hat, discusses the similarities – and big differences – between DevSecOps and sport. There’s the World Cup, cricket, baseball, rugby, Wimbledon –...

Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text...

Top tips for staying safe online on Amazon Prime Day

Industry experts have offered their tips on how to ensure network and personal data is safe from hackers this Amazon Prime Day. Josh Bartolomie, Director, Research and Development, Cofense Unfortunately, with the...

Why a unified approach to security is best – Fortinet expert

A new approach to network security is needed, according to John Maddison, Senior Vice President of Products and Solutions, Fortinet. Here, he argues that, in order to close the gaps inherent in isolated management...

Schneider Electric expert on why ‘security is everyone’s...

As more companies embark on digital transformation strategies, every employee needs to have security at the forefront of their mind. Hervé Coureil, Chief Digital Officer, Schneider Electric offers three pieces...

How to navigate the intersection of DevOps and security

Meera Rao, Senior Principal Consultant at Synopsys, discusses how organisations and businesses can best approach DevSecOps. A brief history of Dev vs. Ops Traditionally, the software development process is split into...

Browse our latest issue

Intelligent CISO

View Magazine Archive