Industry Expert

Regaining control of CNI in the face of cyberthreats

A cyberbreach on Critical National Infrastructure (CNI) could have a catastrophic impact on the national economy. Joseph Carson, Chief Security Scientist at Thycotic, explains the impact of CNI attacks and how to...

Why a partner-led approach is critical to effective cybersecurity

Cybersecurity is a specialist field that requires focus and dedicated resources. Rentia Booysen, Product Manager at Westcon-Comstor Sub-Saharan Africa, explains how relying on an experienced partner ecosystem becomes...

IT decision makers concerned over cost of quantum defence

Companies are already preparing to deal with quantum threats. Tim Hollebeek, Industry and Standards Technical Strategist, DigiCert, explains how Quantum Key Distribution (QKD) has been hailed as a potentially...

Data Management: How can CIOs balance risk with business gain in the age of...

GDPR has forced business to take a much broader look at data management. John Pocknell, Senior Market Strategist at Quest, explains how to better manage data and how it will make a difference to companies. In the age...

A new cost for network blindness: derailed mergers and acquisition deals

An undisclosed data breach can dramatically alter any merger or acquisition. Mike Campfield, VP, Global Security Programs, ExtraHop, explains how cyber audits are now standard practice and how companies make...

It’s time to get misconfiguration in the cloud under control

A misconfigured storage bucket in the cloud can often go unnoticed but it can result in a cyberattack. Mike Campfield, VP, Global Security Programs, ExtraHop, explains what the problem is and how companies can address...

Browse our latest issue

Intelligent CISO

View Magazine Archive