Insights

2022’s updated network security threats and five steps to optimize IT i...

Richard Barretto, CISO, Progress, provides us with an updated list of IT infrastructure security threats and worries technology and business leaders should watch out for in the rest of 2022, as well as specific steps...

Why incident response and insurance must learn to be bedfellows

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to...

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips...

For MSSPs XDR can be the foundation of effective ‘living security’

Vibin Shaju, Presales Director – EMEA, Trellix, discusses the value of extended detection and response (XDR) for managed security service providers (MSSPs). Two years on from our planetwide migration to the...

Netskope CISO on leading a successful security transformation with Security...

In this interview with Intelligent CIO’s Jess Abell, Neil Thacker, EMEA and LATAM CISO for Netskope, highlights why traditional network security architecture is no longer fit for purpose, as well as why...

How Zero Trust can lead the battle against ransomware

Sydney-based Ian Farquhar, Field CTO, Gigamon, tells us how in a world where the workforce has shifted significantly to a ‘work anywhere, work anytime’ model, embracing Zero Trust makes sense. Zero Trust...

Browse our latest issue

Intelligent CISO

View Magazine Archive