Thought Leadership

Protecting from the cyber kill chain evolution

As cybercriminals ramp up their approach, organisations must implement an effective incident response plan to identify, analyse and mitigate attacks. Chris Vaughan, AVP – Technical Account Management, EMEA...

Mind the gap: Five most common weaknesses in a business’ cybersecurity

Victor Lough, Cyber Security & Advanced Digital Services Business Lead, Schneider Electric, points out the common weaknesses in a business’ defence system and discusses the importance of operating with fully...

Proactively preventing cyberattacks and keeping the business operational with...

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is...

Why ‘castle-and-moat’ protection is no fairy tale

Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more...

Fortinet expert on the threats impacting education cybersecurity

The threat landscape is continuously evolving with the adoption of innovative technology to meet vast demands. This is especially true in the education sector. As academic institutions adopt new technologies to...

Securing the cloud: Why speed is of the essence

Organisations across the Middle East are increasingly adopting cloud applications and platforms. Given the remote nature of modern workforces, it’s important they do not overlook security. Arie de Groot, Senior D...

Browse our latest issue

Intelligent CISO

View Magazine Archive