Intelligent Enterprise Security

Navigating the AI frontier: Five steps for secure enterprise adoption

Navigating the AI frontier: Five steps for secure enterprise adoption

During this technological evolution, business leaders are looking for new and improved IT tools that offer speed and efficiency, but many are blind to the potential security risks. Omer Grossman, Chief Information...

How recycling tech giant TOMRA showcased communications while battling a cyberattack

How recycling tech giant TOMRA showcased communications while battling a...

After suffering a security breach, TOMRA followed a Business Continuity plan that fostered transparency, respect and reassurance. James Watts, Managing Director, Databarracks, tells us about the efforts that TOMRA...

Ransomware attacks double in municipalities, healthcare, education

Ransomware attacks double in municipalities, healthcare, education

Barracuda Networks, provider of cloud-first security solutions, published its Fifth Annual Threat Spotlight on Ransomware. The new report looks at ransomware attack patterns that occurred between August 2022 and July...

How is Generative AI facilitating more sophisticated cyberattacks and how can this be prevented?

How is Generative AI facilitating more sophisticated cyberattacks and how can...

Acronis, a global leader in cyber protection, has released the findings of its mid-year cyberthreats report, From Innovation to Risk: Managing the Implications of AI-driven Cyberattacks. The comprehensive study, based...

Industry experts comment on GDPR five years on

Industry experts comment on GDPR five years on

It’s been five years since the General Data Protection Regulation (GDPR) came into play as a means of keeping track of how people and organisations handle data – and that they do so securely. Industry...

Being proactive about closing the cyber skills gap

Being proactive about closing the cyber skills gap

The skills gap is a heavily talked about subject amongst industry professionals as they attempt to find ways to appeal to potential new employees. New Fortinet research has revealed escalating cyber-risks due to the...

74% of enterprise IT budgets are increasing to drive business growth

74% of enterprise IT budgets are increasing to drive business growth

Omdia’s 10th annual IT Enterprise Insights study has revealed that IT has become one of the main drivers of value to an enterprise, with almost three-quarters (74%) of respondents confirming increases to their...

With a growing need to connect everything within the business, how can enterprises regain control over their increasingly complex and sprawling technology and data? 

With a growing need to connect everything within the business, how can...

Cloudflare – a security, performance and reliability company helping to build a better Internet and a leading connectivity cloud company – has released a commissioned study conducted by Forrester...

Five tips on how to overcome the digital skills gap

Five tips on how to overcome the digital skills gap

Data and digital competence is increasingly becoming a key factor for corporate success. However, there is often a lack of expertise and specialists, particularly in the areas of cloud computing, data science, Machine...

Ransomware attacks double in municipalities, healthcare, education

Ransomware attacks double in municipalities, healthcare, education

Barracuda Networks, provider of cloud-first security solutions, published its Fifth Annual Threat Spotlight on Ransomware. The new report looks at ransomware attack patterns that occurred between August 2022 and July...

Industry experts comment on GDPR five years on

Industry experts comment on GDPR five years on

It’s been five years since the General Data Protection Regulation (GDPR) came into play as a means of keeping track of how people and organisations handle data – and that they do so securely. Industry...

Cybersecurity roadmap: Threats proliferate but best practice still works

Cybersecurity roadmap: Threats proliferate but best practice still works

Zeki Turedi, CTO EMEA, CrowdStrike, discusses the cybersecurity landscape in the months to come and why the way forward depends on your choice of partner, not technology. It’s safe to say that last year was...

Revolutionising fraud detection in carsharing set to drive innovation in identity verification

Revolutionising fraud detection in carsharing set to drive innovation in...

Confronted by escalating levels of fraudulent activity within its platform, Getaround’s integrity faced significant threats. Pierre Béret, COO, Getaround, shares how the partnership with Onfido has...

ArrowXL delivers seamless connectivity to its customers

ArrowXL delivers seamless connectivity to its customers

With the customer at the heart of its operations, ArrowXL prioritises delivering a seamless and secure network with minimal disruptions. Rachel Hopkins, CIO at ArrowXL, discusses how the organisation’s...

Dunelm secures its online presence with Fastly

Dunelm secures its online presence with Fastly

Jan Claeyssens, Devsecops Principal Engineer at Dunelm, discusses the retailer’s collaboration with Fastly in its mission to build an effective security strategy at the Edge. Dunelm, one of the UK’s...

Grammarly exceeds customer expectations with hacker-powered security

Grammarly exceeds customer expectations with hacker-powered security

As the world’s leading AI communication assistant serving more than 30 million people and 50,000 teams daily, Grammarly’s top priority is to ensure the data its customers trust it with remains secure and...

How Sandvik managed the shift to a Zero Trust framework

How Sandvik managed the shift to a Zero Trust framework

Sebastian Kemi, Chief Information Security Officer at Sandvik, discusses how the organisation has shifted to a Zero Trust-based security infrastructure as a way to combine new technologies with its business strategy...

Coventry University achieves first-class results with enhanced endpoint security strategy

Coventry University achieves first-class results with enhanced endpoint...

Coventry University has leveraged CrowdStrike Falcon Complete managed detection and response (MDR) for comprehensive protection of a dynamic campus environment. Steve Rogers, Enterprise Cloud, Infrastructure and...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive