Deep Dive

Interview: LogMeIn expert on strengthening password security

Despite weak, stolen or reused passwords being the main cause of breaches, IT executives still lack control over password security in their organisations. With GDPR in force and high-profile breaches now consistently...

Tenable releases study on measuring and managing cyber-risks

Tenable, the cyberexposure company, has released the Measuring and Managing the Cyber Risks to Business Operations Report, an independent study conducted by Ponemon Institute. It found that 60% of organisations...

Seven cyberintelligence insights for a more secure business

Cyberthreat intelligence (CTI) involves the collection, evaluation, verification and distribution of information about ongoing and emerging cyberthreats and attacks against network assets and infrastructure. It is...

CyberArk expert – ‘Protecting CNI starts with securing social...

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a major cause for concern...

The surveillance dilemma – how to manage capacity and maintain security

In the UK alone, there are between 4 million and 5.9 million CCTV surveillance cameras protecting the public, their property and helping to prevent crime and bring criminals to justice. But this ongoing growth...

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they aren’t already, become a non-negotiable...

Browse our latest issue

Intelligent CISO

View Magazine Archive