Thought Leadership

Checklist for selecting best data protection appliance for your enterprise

Nikhil Korgaonkar, Regional Director, Arcserve India and SAARC, shares four common use cases for data protection appliances and the capabilities to look for in potential platforms to find one that matches your...

Ensuring effective IT security in a world of Edge Computing

Joseph Salazar, Technical Marketing Manager, and Vlado Vajdic, Solutions Engineer, both of Attivo Networks, explain how it is essential to take a multi-layered approach to security when adopting Edge Computing. Edge...

Security tips for start-ups from Kaspersky

From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial act...

Culture is key: How CIOs can build cyber-resilience

Nick Emanuel, Senior Director of Product, Webroot and Carbonite, stresses the importance of training to build up an organization’s cyber-resilience. Given the widespread technology transformations, shifts and disruptions o...

Insider data leaks: Causes and remedies

Adam Gordon, Country Manager ANZ at Varonis, explains the most common causes of insider data breaches, the impact of remote working and key ways organisations can mitigate these risks. In movies, nefarious corporate...

Ransomware 2020: A year of many changes

Fady Younes, Cybersecurity Director, Middle East and Africa, Cisco, on why organisations need to be proactive in developing comprehensive security strategies and take the evolving threat landscape serious. 2020 was a...

Browse our latest issue

Intelligent CISO

View Magazine Archive