Thought Leadership

The Digital Horizon – Tracking security trends

Bashar Bashaireh, VP Middle East, Türkiye and North Africa at Cloudflare, discusses new challenges amid a changing cybersecurity landscape. The digital landscape is undergoing a rapid transformation, driven by several ...

Strengthening the core pillars of cyber-resiliency

Sam Woodcock, Director of Cloud Strategy and Enablement at 11:11 Systems, emphasises that the ever-evolving threat landscape demands a mindset of continuous improvement to stay agile and effectively respond to the...

Protecting your devices for 25 years and beyond: Celebrating the TPM

Joe Pennisi, President of the Trusted Computing Group (TCG), tells us how TCG and its Trusted Platform Module (TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence...

Secure by Design: A continued priority in 2025 and beyond

Jim Richberg, Global Field CISO, Fortinet, says Secure by Design is a foundational approach to product development that vendors must embrace, ensuring that security is a foundational component of the design and ...

International Women’s Day 2025: Tech leaders discuss how to accelerate action

The theme to this year’s International Women’s Day is ‘Accelerate Action.’ We asked some of the leading women in the technology industry what more needs to be done break down barriers and create opportunities for women a...

How Bybit’s multi-signature crypto wallet was compromised

Security researchers have determined that hackers injected malicious JavaScript directly into Safe’s online infrastructure hosted on AWS. The code was specifically designed to activate only when interacting with...

Browse our latest issue

Intelligent CISO

View Magazine Archive