Magazine Button

Insights

Building a human firewall to address insider threats

Creating a strong cybersecurity culture is paramount to the smooth running of a company’s operations, particularly as attacks become more advanced. Renee Tarun, Deputy CISO/Vice President Information Security, Fortinet, discusses the steps for how CISOs can establish a baseline for good cyberhygiene and ensure their employees take cybersecurity seriously. During the first half of 2020, […]


Transforming to a scale-out data storage approach

Leo Lynch, Director, Asia Pacific at StorageCraft, outlines some of the key benefits of scale-out storage solutions, including scalability, simplified management, data storage optimisation and disaster preparedness in the event of natural disasters or a ransomware attack. Data growth is surging. IDC predicts that data creation in APJxC will increase from 5.9ZB in 2018 to […]


Attracting and keeping the best tech talent in A/NZ

Angus Dorney, Co-CEO of Kablamo, and former MD of Rackspace, talks us through 10 ways to attract and keep the best tech talent in Australia and New Zealand – even though many people claim this is impossible. Not too long ago, a report by the Australian Industry Group (AIG) found that 75% of businesses surveyed […]


How can a data centre’s design contribute to optimum performance?

There are a number of elements that contribute to a data centre’s design, including location, efficiency, layout, mechanical design, to name a few. All of these factors contribute to its operability and performance capability. Mark Fenton, Product Manager at Future Facilities, defines a data centre’s performance as being a mixture of many things and that […]


Securing connections in the cloud and across IoT devices

As today’s highly competitive and hyper-connected digital marketplace is driving new trends in networking and security, including the rapid adoption of cloud services and IoT devices, Jonathan Nguyen-Duy, Vice President, Global Field CISO Team, Fortinet explains the importance of securing IoT and cloud connections. The hyper-connected, global marketplace of the 21st century has shifted the landscape […]


Five steps to putting your people at the heart of the public sector’s data strategy

In order to drive efficiency within a company’s business strategy, it must operate with a strong data-literate culture. Jordan Morrow, Global Head of Data Literacy, Qlik, explores the steps that public sector employers can take to ensure their employees are able to confidently read, analyse, challenge and use data effectively. From helping police forces to […]


Subex expert on the cyberthreats facing manufacturers

Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s critical that CIOs take steps to secure their critical infrastructure. Vinod Kumar, CEO, Subex, tells us about the challenges facing manufacturing firms and how they can get ahead of attackers. Can you tell us about some […]


Successful HR from the home office

Tips and learnings from the Coronavirus crisis by Glyn Yates, Country Manager IMEA, Matrix42. The upheavals caused by the Coronavirus crisis show us what the future of work could look like and how important digitalisation is. This also applies to the HR department. Over the past few weeks, many HR departments have experienced what it […]


Cultivating a successful risk management strategy for secure operations

Assessing and addressing risk is essential to the role of a CISO as well as being a core factor in minimising disruption to business operations. Martin Redmond assists CIOs and CISOs with implementing relative controls outlined in their frameworks, and he is currently doing this for John Deere Financial. Martin Redmond is CEO of Analytic […]


Seven ways cyber criminals steal your passwords

One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. However, one thing is indisputable: we’re going to be using them today, tomorrow and for the foreseeable future. Unlike touch or facial recognition […]


Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies on online services to power its learning and teaching environment, a greater number of devices belonging to students or staff connected to the network are […]


PAS Global expert on how best to approach OT cybersecurity

Eddie Habibi, founder and CEO of PAS Global, is considered a pioneer and thought leader in the fields of industrial control systems (ICS) cybersecurity, Industrial IoT, data analytics and operations management. He talks to Intelligent CISO here about why IT and OT security must come together to ensure industrial facilities remain secure, using best practice guidance from Christophe […]


Browse our latest issue

Intelligent CIO APAC

View Magazine Archive