Insights

Going those extra lengths to protect consumer data

With the amount of data dominating the current tech landscape, CIOs and business leaders must prioritise how they manage consumer data to avoid the repercussions. A number of experts give their views on how companies...

Five ways automation puts time on your side during a DDos attack

A10 Networks has explored five ways automation can significantly improve your response time during a DDos attack. DDos attacks can be catastrophic, but the right knowledge and tactics can drastically improve your...

Going back to school to protect UK businesses from cybercriminals

As technology develops, cyber incidents are inevitably becoming more and more common so it is crucial to promote the cybersecurity industry as lucrative and rewarding. According to James Lyne, Head of Research and...

Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many...

A CTO’s opinion: Five key steps for shifting security left

Paul Farrington, EMEA CTO, Veracode, discusses the practical steps organisations can take to make sure their development and security teams are working better together to implement a successful ‘shift...

Nutanix expert on how firms can prevent cloud application attacks

Andrew Senior, Customer Success Manager, Nutanix, on what organisations can do to prevent cloud application attacks. Cloud has become the first choice for modernised applications, which we now term cloud-native...

Browse our latest issue

Intelligent CISO

View Magazine Archive