Industry Expert

Adapting to the quantum shift: Trends in encryption and IoT security

Ted Shorter, CTO; Tomas Gustavsson, Chief PKI Officer and Ellen Boehm, SVP, IoT Strategy and Operations; Keyfactor, outline a pivotal shift in how organizations approach cryptographic security. As quantum computing...

Bitcoin’s meteoric rise and the scammers following behind

Bashar Bashaireh, VP Middle East, Türkiye & North Africa at Cloudflare, explains how cybercriminals are looking to exploit unsuspecting individuals investing in cryptocurrency. As Bitcoin continues to surge in ...

DORA non-compliance could cost your business

Sean Tilley, Senior Director of Sales for EMEA, 11:11 Systems, says organisations that fail to comply with DORA face a spectrum of significant consequences that could jeopardise not only their operations but also...

Businesses need to move beyond the 3-2-1 rule amid today’s AI-powered cyber t...

Chad Chiang, Managing Director – Synology UK, says that evolving cyber threats need an evolved solution. Data is the foundation upon which virtually all modern-day organisations are built. And yet, against a...

Q&A: How organizations can achieve Secure-by-Design by 2030

Matias Madou, Co-founder and CTO, Secure Code Warrior, says Secure-by-Design (SBD) requires a cultural shift in how developers approach security. Can organizations fully embrace SBD in the next 5 years? By 2030,...

The cyberskills gap: The ongoing issue in cybersecurity

The cybersecurity industry is faced with a growing skills gap, with demand for skilled professionals far outpacing supply. As cyber threats become more sophisticated, organisations are struggling to protect their...

Browse our latest issue

Intelligent CISO

View Magazine Archive