Insights

Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital identity debt dilemma and the ‘de...

How Zero Trust can streamline the challenge of corporate M&A

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us completing the complex IT integrations required by mergers and acquisitions (M&A) processes is fraught with difficulties but many of...

Introducing Cloudforce One: Cloudflare’s new threat operations and research t...

Blake Darché, Head of Threat Intelligence at Cloudflare, introduces Cloudforce One, a new threat operations and research team from Cloudflare. Meet Cloudflare’s new threat operations and research team: Cloudforce On...

A good anti-ransomware strategy is at the heart of Digital Transformation

Mohamad Rizk, Senior Director, Technical Sales – Middle East, Russia and CIS at Veeam Software, outlines the pillars of a sound security strategy. Digital Transformation is seen as a big investment but is becoming...

How security and Business Continuity became inseparable

Aden Axen, Cloud Services Manager at Somerville, tells us the factors that used to trigger Business Continuity arrangements are no longer the biggest concern for Australian organizations. Business Continuity and...

Containing and securing Shadow IT and technical debt

Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware...

Browse our latest issue

Intelligent CISO

View Magazine Archive