Thought Leadership

SANS expert on getting the best value out of security assessments

Assessments such as vulnerability scanning and penetration testing help organisations to find gaps in their defences. But careful consideration must be given ahead of rolling these out. Bojan Zdrnja, SANS Certified...

Data processing in cloud environments: Managing security and compliance

Modern enterprises are facing the challenge of achieving robust security and compliance while they leverage their vast stores of data in the cloud. Anurag Kahol, CTO at Bitglass, discusses this challenge and unveils...

Fortanix expert on how European companies are taking back control of their...

When running workloads with sensitive and regulated data in the cloud, organisations are seeking greater options to enable them to protect and control that data themselves. Faiyaz Shahpurwala, Chief Product Officer at...

Poll hacks: How cybercriminals aim to disrupt elections

The UK general election is upon us and amongst the bombardment of polarised political news, cybercriminals cast a menacing shadow. These are politically unprecedented times and the UK’s National Cyber Security...

Protecting the IoT-driven network – a multi-stage approach

Simon Wilson, CTO HPE Aruba UK and Ireland, gives us invaluable advice on deploying a multi-stage strategy to ensure protection vulnerable IoT-driven networks. The Internet of Things (IoT) is more than just the next...

Troye Technical Director on extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security...

Browse our latest issue

Intelligent CISO

View Magazine Archive