Deep Dive

Reclaiming the cloud: How CISOs can ensure security in cloud initiatives

Cloud services now play a central role in the digital operation of modern enterprises. But security teams are often being left out in the cold, increasing the level of risk an organisation is facing. Gidi Cohen, CEO...

Thycotic research reveals security pros struggle to quantify what success...

The vast majority of IT security professionals work to a set of Key Performance Indicators (KPIs) yet struggle to align these metrics with overall business goals, according to a new study by Thycotic, a provider of...

Vectra research reveals RDP is ‘widely exposed’ and...

Vectra, a leader in network threat detection and response (NDR), has disclosed that the Remote Desktop Protocol (RDP) is a widely exposed and vulnerable attack surface and will likely continue in the near future due...

New interoperability and data sharing initiative aims to thwart attacks

The OASIS international consortium has announced an industry initiative to bring interoperability and data sharing across cybersecurity products. With initial open source content and code contributed by IBM Security...

Industry experts on managing cyber-risk in the Middle East

Rarely does a day pass without news of a new cyberattack or threat. And while many of these transcend country or regional borders, there are some trends and nuances that can be found in certain parts of the world. As...

OneSpan expert on how banks can combat identity fraud with verification

Identity fraud is a major issue that’s costing the UK banking industry an estimated £1.2 billion, with a new incident of financial fraud being reported every 15 seconds in 2018. Tim Bedard, Director,...

Browse our latest issue

Intelligent CISO

View Magazine Archive