Thought Leadership

The evolution of network security: Why organisations need a new approach

There is no doubt that the network perimeter has changed as workforces are now spread across office, home and remote environments. Traditional approaches to cybersecurity are no longer adequate. Here, Brendan...

Biometrics – The next frontier in the cybersecurity fight

Businesses in the modern world must utilise security procedures like biometrics to stay ahead of the competition. Grahame Williams, Identity & Access Management Director at Thales, discusses how biometrics is...

Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of the g...

spiderSilk CEO on addressing the challenges of attack surface management for...

Businesses are finding themselves in the unviable position of having to deal with rampant cyberthreats while they push their Digital Transformation strategies forward and continue to navigate the remote workforce...

Vulnerability assessment, penetration testing or red teaming: which is right...

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of defending S...

First steps to SASE – A unified digital approach for forward-thinking c...

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the...

Browse our latest issue

Intelligent CISO

View Magazine Archive