Insights

How to modernize those legacy apps without compromising security

Yaniv Hoffman, Vice President and Managing Director – Radware APJ, tells us how legacy apps can be modernized without security problems. He says: “It is through frictionless security that critical...

Building trust in a Zero Trust environment

Gil Vega, Chief Information Security Officer at Veeam, asks how companies can effectively navigate Zero Trust without creating friction among employers and employees. A recent study by MITRE and DTEX revealed that...

The CIO’s role in securing cloud environments and simplifying cloud m...

Ensuring security in the cloud is of paramount importance in today’s modern working world. Ishpreet Singh, Chief Information Officer, Qualys, discusses some of the ways CIOs can create business value through the...

If achieving effective security is the question … Zero Trust is the answer

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us how IT leaders can achieve effective security with Zero Trust. The past two decades have seen astounding progress made in all areas of...

Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password...

Microsoft, Databricks and other leading giants show data analytics solutions...

With ASEAN rapidly trying to leverage the potential of data, BYTES 2022 – ASEAN, a two-day virtual summit, provided the necessary platform to the key industry stakeholders and experts to share their vision,...

Browse our latest issue

Intelligent CISO

View Magazine Archive