Thought Leadership

Why cybersecurity consulting should be boring and collaborative like public...

Nick Ellsmore, Director of Consulting and Professional Services (Pacific) at Trustwave, tells us that while state-sponsored cyberattacks get the headlines, there is plenty of pragmatic work that can be done to...

Closing the skills gap: The art of finding and retaining cybersecurity talent

The cybersecurity skills gap is not going away any time soon. Tim Bandos, CISO at Digital Guardian, explains how companies shouldn’t always rely on the same channels to look for employees. He says sometimes the...

What does COVID teach us about OT cybersecurity?

Historically, OT processes ran on non-routable protocols. But the so-called air gap has disappeared as industrial networks converge with the IT network. This means operations teams have had to rethink the...

Powering up cybersecurity to protect CNI

Gareth Williams, Vice President – Secure Communications & Information Systems, Thales UK, speaks about risk management and fraud detection, outlining what enterprises, particularly in the financial sector,...

Why 360-degree visibility is vital to protect critical infrastructure

Aaron Ross, APAC Manager of Technical Services at Paessler, tells us without 360-degree visibility those responsible for safeguarding the sanctity of an organization’s data are flying blind. He says: “CIOs...

Simeio Solutions expert says: “Most breaches are from exploited passwords. L...

James R Quick,Director, Solutions & Advisory for Simeio Solutions, tells us it’s time to get rid of passwords and instead automate and secure the authentication process. There are two things we can do to...

Browse our latest issue

Intelligent CISO

View Magazine Archive