Thought Leadership

F5 Networks expert on why securing apps and passwords are being ignored

Despite education and constant reminders that security is everyone’s responsibility, Lori MacVittie, Principal Threat Evangelist, F5 Networks, says that the most basic of security practices is being completely...

Quest Software expert on the five steps required to battle endpoint...

Ken Galvin, Senior Product Manager at Quest Software, outlines five essential steps CISOs should be taking to protect their endpoints against cybercriminals. It’s no secret that cyberattacks are a growing problem for g...

A cloud built on integrated security

With the cloud services market expected to grow at a rate of 28% over the next five years to top R23 billion by 2023, Ralph Berndt, Director – Sales and Marketing at Syrex, says that South African companies have f...

SANS expert on getting the best value out of security assessments

Assessments such as vulnerability scanning and penetration testing help organisations to find gaps in their defences. But careful consideration must be given ahead of rolling these out. Bojan Zdrnja, SANS Certified...

Data processing in cloud environments: Managing security and compliance

Modern enterprises are facing the challenge of achieving robust security and compliance while they leverage their vast stores of data in the cloud. Anurag Kahol, CTO at Bitglass, discusses this challenge and unveils the...

Fortanix expert on how European companies are taking back control of their...

When running workloads with sensitive and regulated data in the cloud, organisations are seeking greater options to enable them to protect and control that data themselves. Faiyaz Shahpurwala, Chief Product Officer at...

Browse our latest issue

Intelligent CISO

View Magazine Archive