Blogs

How can vendors and end-users get the best out of their partnerships?

One of the challenges that modern CISOs face is knowing where to channel investment. And given that there are many vendors, often offering similar services, choosing a provider or product can be difficult. A good...

Blockchain helps assure consumers their food is ethically sourced

Opinion piece by Craig Nel, Mobile & Cognitive Experience (MCX) Leader at Oracle Middle East, Africa and Turkey. Ensuring ethical sourcing is a major focus area for many companies as they start to understand just...

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus,...

Artificial Intelligence and the birth of the next generation data centre

Ian Jansen van Rensburg, VMware EMEA Senior Systems Engineer, looks at the rise of Artificial Intelligence and the birth of the next generation data centre. Artificial Intelligence has rapidly become a leading driver...

Exploring the role of cybersecurity in enterprise risk management

Anna Mazzone, MD and GM of UK and Ireland at MetricStream, discusses the role of cybersecurity in enterprise risk management. The importance of cybersecurity has never been so acute with data breaches and...

Get To Know: Mike Kelly, Chief Information Officer, Red Hat

On the lighter side of things, we caught up with Red Hat’s Mike Kelly, to find out what makes him tick. What first made you think of a career in technology? I started my career in accounting. After I experienced...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive