Top Stories

There is more to cyber-risk than security, says thryve expert

Riaan Bekker, Force Solutions Manager at thryve, which provides risk and governance management technologies, says cyber-risk isn’t just about security; it has become a serious issue of business continuity and is the c...

Tenable experts discuss security vulnerabilities and poor cyberhygiene

Tenable, the cyberexposure company, has announced that Tenable Research has discovered several zero-day vulnerabilities in the PremiSys access control system developed by IDenticard. When exploited, the most severe...

Fraud-free digital experiences offered to companies in Spain

Payfone, a leading digital identity authentication network, and the GSMA, a trade body representing mobile network operators worldwide, have announced a new partnership to bring fast, frictionless and fraud-free login...

Understanding the role of AI, ML and Deep Learning in cybersecurity

Derek Lin, Chief Data Scientist at Exabeam, talks to us about AI, ML and Deep Learning and how to avoid getting lost in the hype. When it comes to Artificial Intelligence (AI) and Machine Learning (ML), there’s no s...

The lessons poker can teach us about privileged threat analytics

David Higgins, Director of Customer Development at CyberArk, explores the cybersecurity lessons business leaders can learn from poker. Brian Koppelman and David Levien’s 1998 cult classic poker movie &...

Five things to consider when recruiting a data protection officer

Jan van Vliet, VP and GM EMEA of Digital Guardian, discusses what the role of DPO entails and outlines five critical components to look for in potential candidates.  With GDPR now in force, one of its central ...

Browse our latest issue

Intelligent CISO

View Magazine Archive