Insights

Securing the Internet of Things in the 5G era

Simon Bryden, Manager Consulting Systems Engineering at Fortinet, discusses why an integrated and holistic security architecture is necessary to offer the visibility required to see and identify IoT devices, as well...

Protecting from the cyber kill chain evolution

As cybercriminals ramp up their approach, organisations must implement an effective incident response plan to identify, analyse and mitigate attacks. Chris Vaughan, AVP – Technical Account Management, EMEA...

Mind the gap: Five most common weaknesses in a business’ cybersecurity

Victor Lough, Cyber Security & Advanced Digital Services Business Lead, Schneider Electric, points out the common weaknesses in a business’ defence system and discusses the importance of operating with fully...

Addressing cloud security for Operational Technology and Industrial Control...

Peerapong Jongvibool, Senior Director, Southeast Asia and Hong Kong, Fortinet, tells us having an integrated cybersecurity platform enables organisations to build security by design to maintain the same level of...

Five keys to mitigating today’s ransomware risks

Dmitry Dontov, CEO and Chief Architect of Spin Technology, considers the best ways to approach modern ransomware prevention in the modern workplace. Ransomware attacks grew by 435% in 2020 compared to 2019 and this...

Inside the mind of a cyber criminal

Cyber criminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion...

Browse our latest issue

Intelligent CISO

View Magazine Archive