Thought Leadership

How to pivot a PII strategy against the growing threat of cyberattacks

Stockholm-based Petra Tesch, Chief Information Officer, Vizrt, asks how can a company ensure its Personally Identifiable Information (PII) is adequately protected? Cyberthreats are increasing and becoming more serious...

Why CIOs need a secure strategy for output management

In today’s rapidly changing cybersecurity landscape, it is important that companies invest in a robust defence against digital vulnerabilities – but output management is one area that is often overlooked. This complex env...

How Zero Trust has evolved with the times

Dave Russell, Vice President, Enterprise Strategy at Veeam, tells us how the idea of Zero Trust has had to evolve with the times. Around 18 months ago, I was writing about the ‘endless journey’ to Zero Trust. I used the wor...

Five tips to stay out of the phishing trap

Bashar Bashaireh, Managing Director, Middle East and Turkey, Cloudflare, outlines key recommendations that will help organisations stay out of the phishing trap. Email is the most exploited business application. It is...

The importance of Nudge Theory in email security

Robin Bell, CISO at Egress, provides insight into the essential components of robust email security strategies. It’s estimated that individuals make 35,000 decisions every day according to psychologists, or one decision e...

Building trust in Generative AI through a Zero Trust approach

San Francisco-based Tim Freestone, Chief Strategy and Marketing Officer at Kiteworks, tells us how the evolution of Generative AI prompts the necessity for a Zero Trust security approach, combining cybersecurity...

Browse our latest issue

Intelligent CISO

View Magazine Archive