Insights

Containing and securing Shadow IT and technical debt

Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware...

Research reveals 40% of companies believe their cyber strategy will be...

A perfect storm of escalating cyberattacks and global tech innovation leaves 61% of Chief Information Security Officers (CISO) only ‘fairly confident’ of managing their current threat exposure. A recent...

How much is enough? How to build a targeted and sustainable cybersecurity...

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at...

How to remain cybersecure with ‘bringing your own devices’ 

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with cyberattacks as of late and why it is therefore essential for organisations to address...

What does Multi-Factor Authentication (MFA) mean for the future of business?

Travis Spencer, CEO of Curity, takes an in-depth look at how Multi-Factor Authentication (MFA) bolsters the security of a single password and the protections MFA provides to secure businesses. It’s been over a...

1,100 IT pros spotlight the security hazards of hybrid work

Anthony James, VP of Product Marketing at Infoblox, provides an insight into Infoblox’s survey into the global state of security, including the impact of remote workers. Today’s cybersecurity challenges...

Browse our latest issue

Intelligent CISO

View Magazine Archive