Insights

Inside the mind of a cyber criminal

Cyber criminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data,...

Proactively preventing cyberattacks and keeping the business operational with...

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is...

How we respond today impacts our security tomorrow

Lior Div, CEO and Co-founder, Cybereason, asks how the US government should respond to the threat of persistent and highly damaging cyberattacks and considers what strategies should be deployed to reverse the...

Why ‘castle-and-moat’ protection is no fairy tale

Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more...

What it means to be a cybersecurity vendor for enterprise clients: Five key...

Evgeniya Naumova, VP, Global Sales Network, Kaspersky, on the challenging market conditions and how the cybersecurity vendor is helping its enterprise customers to navigate the security challenges in tough times. The...

Genetec EMEA shares new research into the state of physical security 2021

Insights from over 1,500 physical security leaders highlight cybersecurity as a strategic priority and accelerating adoption of cloud infrastructure for physical security. Genetec, a leading technology provider of...

Browse our latest issue

Intelligent CISO

View Magazine Archive