Deep Dive

Study reveals benefits of next-gen access solutions to organisations

Centrify, a leading provider of zero trust security through the power of next-gen access, has announced results of a commissioned study conducted by Forrester Consulting on behalf of Centrify, which finds that...

SANS survey findings reveal confusion over Industrial IoT security

Organisations hold disparate and unrealistic views on protecting the Industrial Internet of Things (IIoT). This is according to the findings of the 2018 SANS Industrial IoT Security Survey report, which examined the s...

What CISOs should consider when consolidating security solutions

Most CISOs have many, if not too many, security products and tools across their enterprise, according to Jim Doggett, US VP and CISO, Panaseer. He says CISOs should first develop a security framework with the required...

Prioritising investment: Best practice for CISOs on a budget

CISOs face the constant challenge of working to a budget against the backdrop of an ever-growing cyberthreat landscape. It can be difficult to know where to prioritise investment. Intelligent CISO hears from two industry...

How is the cybersecurity skills shortage impacting workforces?

Sudhakar Ramakrishna, CEO of Pulse Secure, a global provider of enterprise secure access solutions, discusses the impact of the cyberskills shortage in the US and what needs to be done to address this. More than 200,000 ...

Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text that you have typ...

Browse our latest issue

Intelligent CISO

View Magazine Archive