Insights

The compromise and misuse of privileged identity

As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how...

How C-level execs can better understand insider risk

In the digital era, it is easy to be blinded by the lights of new technologies. However, this can cause us to disregard the factors which pose a threat to insider risk. Tony Pepper, CEO, Egress, discusses insider...

Cyber Resilience Think Tank forecasts key trends to hit the cybersecurity...

Experts including Christina Van Houten, Chief Strategy Officer at Mimecast, forecast some of the major trends they expect to develop within the cybersecurity industry this year. Mimecast Limited, a leading email and...

What will the future hold for security when everything is constantly...

In order to keep up with the rate at which technology is evolving, CISOs and their security teams must be mindful of the areas of change. Marco Rottigni, Chief Technical Security Officer EMEA, Qualys, offers seven...

Six critical attack vectors to watch out for in your data centre

Data centres can be considered a silver-bullet to a successful hack if an attacker gets their hands on the data they contain. Matt Walmsley, EMEA Director, Vectra, highlights the most critical attack vectors that...

How should businesses and organisations protect against insider threats?

Protecting against insider threats is something all businesses have to manage and is an ongoing process. Shareth Ben, Insider Threat SME at Securonix, discusses a best practice approach for detecting and protecting...

Browse our latest issue

Intelligent CISO

View Magazine Archive