Insights

Industrialisation of cyber crime disrupting digital enterprises

Only a fifth of IT decision-makers in large multinational corporations are confident that their organisation is fully prepared against the threat of cyber criminals. The vast majority of companies feel constrained by...

Security analytics – Does your security operations need it?

I frequently get asked by clients whether they should invest in security analytics projects. Over a period of time, I have built up a conceptual framework to put security analytics in the context of overall security...

Policy management to reinforce a robust security platform

Navigating the landscape of enterprise security can be daunting – the threats typically fly under the radar, and the broad array of malware, hacks and data theft shows real innovation. Worse, the level of malicious s...

The contours of a successful encryption strategy

Data is the new age currency and extremely valuable to organisations. However, there is somebody else who also has an eye on this data – the cybercriminal. While you leverage the potential of your organisational...

Ensuring an always-on business during the holiday season

With the vacation season approaching in the Middle East, employees in the region are looking to either fly back to their home countries or to holiday destinations with cooler climes. This does not mean, however, that...

Understanding the common motives behind DDoS cyber attacks

Distributed denial-of-service (DDoS) attacks continue to be one of the most prevalent methods hackers use to disrupt businesses. Involving the use of multiple systems (personal computers, smartphones, etc.), DDoS...

Browse our latest issue

Intelligent CISO

View Magazine Archive