Thought Leadership

Robust patch management: In the fight against ransomware, it’s time to get b...

Saeed Abbasi, Product Manager, Vulnerability Research, Qualys Threat Research Unit (TRU), tells us how organisations in the Arab Gulf region can effectively combat the growing ransomware threat by prioritising robust...

Removable media is a threat to our critical infrastructure

Sertan Selcuk, VP for METAP and CIS, OPSWAT, answers our questions about the cybersecurity risks posed by peripheral devices and removable media, and how organisations can mitigate these threats while maintaining...

Responsible cloud migration – Overcoming the data security challenge 

Alasdair Anderson, VP of EMEA at Protegrity, discusses responsible cloud migration and addressing data security challenges. Since the world went digital the value of data has been unprecedented, and as businesses race...

CIOs must start an effective security strategy with data loss prevention

With changing work habits and the shift to hybrid work environments, regulations are being updated to reflect new risks. Ann Keene, Regional Director UK & Ireland at Kingston Technology, discusses how CIOs can...

Protecting the keys to the kingdom: Assessing data centre risks

Data is the highest-value asset within a data centre facility and must be shielded. Terry King, Vice President, Security and Technology Consulting at Guidepost Solutions, explores the significance of threat...

The midyear reckoning of cybersecurity predictions

Michael Armer, CISO, RingCentral, assesses how accurate his 2024 technology predictions have been now we are deep into the second half of the year. Predictions are a fool’s game. Six months ago, I laid out my vision for 2...

Browse our latest issue

Intelligent CISO

View Magazine Archive