More News

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a...

Deception technologies, AI and robo hunters are displacing legacy...

The Internet of Things is rapidly expanding the attack surface of the digital enterprise and exposing it to enhanced risk levels not seen before. Deception technologies, artificial intelligence, robo-hunters, are...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including:...

Network control company Infoblox addresses DNS cybersecurity blind spot

Infoblox Inc,  the network control company that provides Actionable Network Intelligence, has announced significant enhancements to its  ActiveTrust Cloud. It offers leverages advanced analytics to expand...

SearchInform and Condyn bring data leak prevention technology to market

Leading information security company SearchInForm has partnered with Condyn to bring its next generation data leak prevention technology to the African market. The benefit of the system is based on the principle...

HID’s IdenTrust named as top digital certification authority

HID Global has announced that its IdenTrust business is the #1 digital certification authority in the world, according to the latest independent research results from W3Techs, a technology survey company...

Browse our latest issue

Intelligent CISO

View Magazine Archive