Thought Leadership

The ‘cumulative effect’ of ransomware and the lessons for UK national inf...

Ransomware has quickly become one of the biggest threats to organisations, and business leaders must get a hold on their infrastructure and ensure they operate with the most stringent security procedures in place....

Six key characteristics of a modern secure web gateway

Key security solutions like secure web gateways (SWGs) are crucial for organisations to overcome the challenges associated with today’s workforce. Anurag Kahol, Founder and CTO at Bitglass, discusses the benefits of u...

Veritas expert on building a unified multi-cloud strategy with resilience at...

Multi-cloud adoption has accelerated this year as organisations have digitalised in light of the pandemic. And while there are numerous benefits of Digital Transformation, this new environment has created challenges for...

Securing the Internet of Things in the 5G era

Simon Bryden, Manager Consulting Systems Engineering at Fortinet, discusses why an integrated and holistic security architecture is necessary to offer the visibility required to see and identify IoT devices, as well...

Protecting from the cyber kill chain evolution

As cybercriminals ramp up their approach, organisations must implement an effective incident response plan to identify, analyse and mitigate attacks. Chris Vaughan, AVP – Technical Account Management, EMEA...

Mind the gap: Five most common weaknesses in a business’ cybersecurity

Victor Lough, Cyber Security & Advanced Digital Services Business Lead, Schneider Electric, points out the common weaknesses in a business’ defence system and discusses the importance of operating with fully...

Browse our latest issue

Intelligent CISO

View Magazine Archive