Insights

Why incident response and insurance must learn to be bedfellows

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to...

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to a...

For MSSPs XDR can be the foundation of effective ‘living security’

Vibin Shaju, Presales Director – EMEA, Trellix, discusses the value of extended detection and response (XDR) for managed security service providers (MSSPs). Two years on from our planetwide migration to the cloud, the u...

Netskope CISO on leading a successful security transformation with Security...

In this interview with Intelligent CIO’s Jess Abell, Neil Thacker, EMEA and LATAM CISO for Netskope, highlights why traditional network security architecture is no longer fit for purpose, as well as why organisations s...

How Zero Trust can lead the battle against ransomware

Sydney-based Ian Farquhar, Field CTO, Gigamon, tells us how in a world where the workforce has shifted significantly to a ‘work anywhere, work anytime’ model, embracing Zero Trust makes sense. Zero Trust has become a wel...

How to modernize those legacy apps without compromising security

Yaniv Hoffman, Vice President and Managing Director – Radware APJ, tells us how legacy apps can be modernized without security problems. He says: “It is through frictionless security that critical applications can be pro...

Browse our latest issue

Intelligent CISO

View Magazine Archive