Enterprise Security

‘Voice of the CISO’: Proofpoint research shines light on security challenges

Proofpoint’s 2021 Voice of the CISO Report has provided insight into the pain points for CISOs, as well as their key priorities looking ahead. Andrew Rose, Resident CISO, Proofpoint, talks us through the...

Embracing the work from anywhere model

Finally, there is a light at the end of the pandemic tunnel. As countries get closer to the easing of lockdowns and social restrictions, many organisations are starting to look forward to welcoming employees and...

New Cybereason ransomware study reveals true cost to UAE businesses

Cybereason study finds 90% of UAE organisations that paid a ransom demand were hit again, 63% reported significant loss of business. Cybereason, a leader in future-ready attack protection, has released research...

The evolution of Digital Transformation

Digital Transformation is the incorporation of computer-based technologies into an organisation’s products, processes and strategies. Industry pundits tell Intelligent CIO Africa, how CIOs are leading their...

Securing the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive