More News

How backup can help businesses to never be held hostage by ransomware

Article by: Richard Agnew, VP NW EMEA at Veeam Software Paying ransom fees to regain access to data in the vague hope that criminals will release files from hostage is a known phenomenon that continues to demand...

How enterprises should best approach privileged access password management

John Hathaway, Regional Sales Director, Middle East, BeyondTrust, tells us about the best ways to deal with Privileged Access Management Privileged password management, sometimes called enterprise password management,...

Enabling a secure digital transformation

Article by C R Srinivasan – Senior Vice President, Global Product Management & Data Centre Services at Tata Communications Organisations today are embarking on their own distinct journeys of digital transformation a...

Why data classification should drive your security strategy

There are two types of businesses in the world today; those that run on data and those that will run on data. As a result, data security now sits at the top of nearly every organisation’s priority list. But with...

Intact launches MyCybercare Insurance to Africa and beyond

The common maxim today is that there are two kinds of companies: those who have been breached, and those who have been breached, but don’t know it yet. Either way, there is little doubt that cybercrime poses a major t...

The rise of Security as a Service in the evolving threat landscape

The constant evolution of the global security threat landscape is playing a part in the rise of Cybersecurity as a Service offerings. In addition, the evergreen discussion around cost modelling, namely the ‘capex vs o...

Browse our latest issue

Intelligent CISO

View Magazine Archive