Thought Leadership

Mind the gap: Five most common weaknesses in a business’ cybersecurity

Victor Lough, Cyber Security & Advanced Digital Services Business Lead, Schneider Electric, points out the common weaknesses in a business’ defence system and discusses the importance of operating with fully...

Proactively preventing cyberattacks and keeping the business operational with...

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is...

Why ‘castle-and-moat’ protection is no fairy tale

Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more...

Fortinet expert on the threats impacting education cybersecurity

The threat landscape is continuously evolving with the adoption of innovative technology to meet vast demands. This is especially true in the education sector. As academic institutions adopt new technologies to...

Securing the cloud: Why speed is of the essence

Organisations across the Middle East are increasingly adopting cloud applications and platforms. Given the remote nature of modern workforces, it’s important they do not overlook security. Arie de Groot, Senior...

Experts discuss whether passwords are still fit for purpose

Cybersecurity professionals discuss how far we can rely on the use of passwords to secure our most valuable information, and how organisations should be securely operating until we can develop a more reliable method...

Browse our latest issue

Intelligent CISO

View Magazine Archive