More News

ExtraHop customers experience 84% reduction in time to resolve threats...

Study showcases how ExtraHop Reveal(x) delivers operational and business benefits for enterprise customers. ExtraHop, a leader in cloud-native network detection and response, has announced survey results of The Total...

US General Services Agency deploys BIO-key’s PortalGuard IAM solution

BIO-key International, a provider of identity and access management (IAM) solutions powered by biometrics, has announced that the US General Services Agency (GSA), which provides centralized procurement for the federal...

Protecting your company’s cybersecurity against employee behavior and bad a...

We asked industry experts: ‘How can technology leaders ensure the work practices of their colleagues do not put their company’s cybersecurity at risk?’ Here’s what Charles Burger, Global Director of Assureon Solutions at ...

Why compliance does not equal security

We asked industry experts: ‘How can technology leaders ensure the work practices of their colleagues do not put their company’s cybersecurity at risk?’ Here is the response from Morey Haber, CTO and CISO at Beyon...

Why IAM is key to securing a remote workforce

Ian Pitt, CIO at LogMeIn, discusses the benefits that a strong IAM framework can provide to organizations. The transition to remote work has undoubtedly impacted companies worldwide, and day-to-day business operations...

New pilot program to block cybercriminals impersonating Services Australia

Telstra, in conjunction with the Australian Cybersecurity Center (ACSC) and Services Australia, is boosting Australia’s cyber-resilience through the launch of a new security measure to block malicious text messages f...

Browse our latest issue

Intelligent CISO

View Magazine Archive