Thought Leadership

Vulnerability assessment, penetration testing or red teaming: which is right...

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of defending S...

First steps to SASE – A unified digital approach for forward-thinking c...

One trend taking the spotlight in the cybersecurity space is Secure Access Service Edge (SASE) and is a solution to the global security needs of the mobile workforce. Richard Walters, CTO, Censornet, discusses the...

Protecting utilities and critical infrastructure from the growing...

Cyberattacks against critical infrastructure and the utilities market are growing in sophistication and frequency. David Stroud, GM of Europe/APAC, NanoLock Security, discusses why decision-makers in critical...

Rewriting the rules on resilient infrastructure

Taking the right steps to forming a reliable Business Continuity and Disaster Recovery strategy are firmly placed at the heart of many boardroom discussions. Steve Blow, EMEA Sales Engineering Manager at Zerto, a...

Digital identities: How to protect against online fraudsters

As the security landscape continues to evolve, new points of vulnerability are becoming a cause for concern. Anurag Kahol, Founder and CTO at Bitglass, discusses the areas organisations should be paying close...

Four critical data storage security questions CIOs must ask

Keeping data safe and protecting it from unauthorised access is a critical part of having a robust cybersecurity posture and is a top priority for CIOs and CISOs. Neil Stobart, VP Global Systems Engineering, Cloudian,...

Browse our latest issue

Intelligent CISO

View Magazine Archive