Thought Leadership

How Bybit’s multi-signature crypto wallet was compromised

Security researchers have determined that hackers injected malicious JavaScript directly into Safe’s online infrastructure hosted on AWS. The code was specifically designed to activate only when interacting with...

AI and ransomware: Cutting through the hype

Rick Vanover, Vice President of Product Strategy at Veeam, explains that AI is transforming most digital industries, including cybercrime. It might be the great paradox: AI. Everyone’s bored of hearing it, but can’t sto...

From doubt to influence: How are women in tech revolutionizing the future?

Ahead of International Women’s Day, Sujatha S Iyer, Head of AI security, ManageEngine, Zoho Corp, says the contributions of women in AI and tech are already shaping the future – and with ongoing support the p...

DNS security is the missing piece in enterprise cyber defence

Despite its vital importance, DNS remains an overlooked component in enterprise security, leaving organisations vulnerable to sophisticated cyber threats. As the volume and complexity of DNS traffic grows, securing...

The three pillars of modern business: Scalability, security and compliance

Mark Molyneux, EMEA CTO at Cohesity, explains that achieving a balance between scalability and security in data management requires a holistic approach – integrating modern data protection technologies, robust...

The Middle East’s rise in economic growth: A prime target for...

Vassilis Penitas, Obrela’s SVP Sales MEA, discusses how understanding emerging cybersecurity trends in the Middle East region is crucial for businesses navigating this evolving landscape.   As the Middle East unde...

Browse our latest issue

Intelligent CISO

View Magazine Archive