Thought Leadership

‘Boundless Cybersecurity’: How SonicWall is helping to uncover unknown thr...

SonicWall research has highlighted an upward trend in the frequency of several cyberattack techniques, with malicious actors preying on vulnerabilities created during the pandemic. Osca St Marthe, Executive Director...

Introducing container vulnerability scanning from Sophos

The demand for container technology has increased in line with the acceleration of cloud migrations which have taken place over the last year. But to move fast and stay secure, every organisation needs visibility of...

XDR — The future of threat detection and response

Yonatan Striem-Amit, Chief Technology Officer and Co-founder at Cybereason, tells us how a strong XDR solution can enable us to regain the upper hand with the ability to detect, correlate and stop attacks in...

Checklist for selecting best data protection appliance for your enterprise

Nikhil Korgaonkar, Regional Director, Arcserve India and SAARC, shares four common use cases for data protection appliances and the capabilities to look for in potential platforms to find one that matches your...

Ensuring effective IT security in a world of Edge Computing

Joseph Salazar, Technical Marketing Manager, and Vlado Vajdic, Solutions Engineer, both of Attivo Networks, explain how it is essential to take a multi-layered approach to security when adopting Edge Computing. Edge...

Security tips for start-ups from Kaspersky

From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial act...

Browse our latest issue

Intelligent CISO

View Magazine Archive