Deep Dive

Hiding in plain sight – what are the key indicators of an insider threat?

How do you identify an attacker who is supposed to be accessing sensitive data as part of their job role? Although they are notoriously difficult to identify there are, nonetheless, tell-tale signs that indicate the...

More than one in three enterprises say cloud apps are the most vulnerable to...

According to the results of a new survey by Securonix, the cloud not only makes enterprises vulnerable to insider attacks, it makes those attacks even more difficult to detect. In the 2019 Insider Threat Report, 39%...

Mimecast expert on why deepfakes are revolutionising the world of phishing

As cybercriminals continue to grow their weapons arsenal, utilising new methods such as voice phishing to cause further damage, it’s important that organisations step up their defences. Jonathan Miles, Head of...

Imperva expert on the rise of AI-enabled cybercriminals

Terry Ray, Senior Vice President and Fellow at Imperva, tells us how AI-enabled cybercriminals will alter the threat landscape – and what this means for CISOs and their teams. Artificial Intelligence (AI)...

Veritas brings enterprise class data protection to the Edge with Flex 5150

Veritas Technologies, a worldwide leader in enterprise data protection and software-defined infrastructure, has unveiled the Veritas Flex 5150 appliance, a complete data protection solution purpose built for the Edge...

Securing company email: The biggest threats and how to combat them

For hackers, email can often be a simple route into an organisation’s network. Educating employees about the dangers and how they can avoid falling for some of the sophisticated methods cybercriminals employ is...

Browse our latest issue

Intelligent CISO

View Magazine Archive