Top Stories

McAfee expert: How to beat malicious actors in the cybersecurity ‘game’

Cybersecurity defences are under unprecedented levels of attack. From old malware foes and newer types, such as ransomware, to sophisticated advanced threats and state-sponsored cyberattacks, breaches are now an...

ServiceNow research uncovers security’s ‘patching paradox’

ServiceNow report finds 63% of EMEA security professionals plan to hire for vulnerability response over the next 12 months, yet more talent alone won’t solve the problem. ServiceNow has released new research, Today’s State of V...

Batelco receives ISO 27001:2013 Certification in information security

Batelco, a leading digital solutions operator in Bahrain, has been presented with a new ISO Certificate in Information Security (ISO 27001:2013) that covers a wider scope, following a thorough and vigorous auditing...

Genetec to embark on 10 city roadshow across Middle East and Turkey

Company to demonstrate unified security and how it successfully incorporates access control and new analytic systems for collaborative insights. Genetec, a leading technology provider of unified security, public safety,...

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a list of e...

Deception technologies, AI and robo hunters are displacing legacy...

The Internet of Things is rapidly expanding the attack surface of the digital enterprise and exposing it to enhanced risk levels not seen before. Deception technologies, artificial intelligence, robo-hunters, are...

Browse our latest issue

Intelligent CISO

View Magazine Archive