Thought Leadership

Poll hacks: How cybercriminals aim to disrupt elections

The UK general election is upon us and amongst the bombardment of polarised political news, cybercriminals cast a menacing shadow. These are politically unprecedented times and the UK’s National Cyber Security Centre k...

Protecting the IoT-driven network – a multi-stage approach

Simon Wilson, CTO HPE Aruba UK and Ireland, gives us invaluable advice on deploying a multi-stage strategy to ensure protection vulnerable IoT-driven networks. The Internet of Things (IoT) is more than just the next...

Troye Technical Director on extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security...

Kaspersky expert on how to decide on your company’s IT security budget

In the modern world, there are a plethora of security products and services to choose from. Businesses can find it daunting to navigate their way through these options to choose the best one. Alexander Moiseev, Chief...

Gartner: Leveraging automation for modern security

Modern security teams are facing more threats than ever, as well as more pressure to provide business value. Katell Thielemann, VP Analyst at Gartner, tells us why it’s so important that CISOs consider automation t...

McAfee Labs offers insight into the threats ahead in 2020 Threats Predictions...

With 2019’s headlines of ransomware, malware and RDP attacks almost behind us, we shift our focus to the cybercrime threats ahead. Cybercriminals are increasing the complexity and volume of their attacks and campaigns, a...

Browse our latest issue

Intelligent CISO

View Magazine Archive