Thought Leadership

The path of least resistance to Privileged Access Management 

David Morimanno, Thought Leader, Xalient, on the now essential nature of a PAM solution.  Privileged Access Management (PAM) has evolved to over 20 years to focus on controlling the access itself – which means ...

Ransomware in the global healthcare industry

Assessing the impact of the healthcare industry’s cybersecurity posture, Leon Ward, VP, Product Management, ThreatQuotient, shares insight into the benefits of investing in data availability, updating legacy systems a...

Robust patch management: In the fight against ransomware, it’s time to get b...

Saeed Abbasi, Product Manager, Vulnerability Research, Qualys Threat Research Unit (TRU), tells us how organisations in the Arab Gulf region can effectively combat the growing ransomware threat by prioritising robust...

Removable media is a threat to our critical infrastructure

Sertan Selcuk, VP for METAP and CIS, OPSWAT, answers our questions about the cybersecurity risks posed by peripheral devices and removable media, and how organisations can mitigate these threats while maintaining...

Responsible cloud migration – Overcoming the data security challenge 

Alasdair Anderson, VP of EMEA at Protegrity, discusses responsible cloud migration and addressing data security challenges. Since the world went digital the value of data has been unprecedented, and as businesses race...

CIOs must start an effective security strategy with data loss prevention

With changing work habits and the shift to hybrid work environments, regulations are being updated to reflect new risks. Ann Keene, Regional Director UK & Ireland at Kingston Technology, discusses how CIOs can...

Browse our latest issue

Intelligent CISO

View Magazine Archive