Thought Leadership

World Password Day: Privileged password management best practices and...

Today is World Password Day. Brian Chappell, Director, Product Management at BeyondTrust, explains the best practices and benefits of privileged password management. Privileged password management refers to the...

Infosys deploys RSA solutions to protect and manage extensive global...

IT giant, Infosys, has half a dozen strategic partners it relies on to deliver key components of its security stack. Executives from the company talk about Infosys’ longstanding partnership with RSA. Longstanding...

How to protect against cyberattacks when working from home during COVID-19

Companies can take relatively straightforward steps to ensure effective cybersecurity for remote working during the COVID-19 pandemic. Ryan Olson, Vice President, Threat Intelligence (Unit 42) at Palo Alto Networks,...

Cultivating a successful risk management strategy for secure operations

Assessing and addressing risk is essential to the role of a CISO as well as being a core factor in minimising disruption to business operations. Martin Redmond assists CIOs and CISOs with implementing relative...

Recovering data and operations after a cyberattack

Cyberattacks are a reality for many businesses in the UK, resulting in both tangible and intangible costs. John Beattie, Principal Consultant at Sungard Availability Services, explains how companies can start off on the...

Global security leaders outline four key trends for how to transform a SOC

Mimecast has published its latest Cyber-resilience Think Tank report which looks at the benefits and challenges of keeping a Security Operating Centre in-house versus outsourcing it. This latest report digs into the...

Browse our latest issue

Intelligent CISO

View Magazine Archive