Magazine Button


How to manage network risk using fluid security

With organisations utilising new technologies in the age of Digital Transformation, it is vital that the security surrounding innovation is up to standard. Amrit Williams, Vice President of Products at Skybox Security, tells us why fluid security’ practices are so important in developing a successful security programme and thus relieving pressure for CISOs. As organisations […]

Experts discuss how enterprises can better manage their data

RSA Security has announced its Adaptive Authentication for eCommerce capability which improves fraud protection and user experience. RSA Security, a global cybersecurity leader delivering business-driven security solutions to help organisations manage digital risk, has announced the general availability of RSA Adaptive Authentication for eCommerce version 20.5. In this version, RSA Adaptive Authentication for eCommerce implements […]

Huawei predicts 10 emerging trends in telecom energy in next five years

Huawei releases 10 emerging trends in telecom energy in 2025, aiming to provide a reference for operators on site infrastructure construction. 5G is coming. Telecom networks need to undergo these three significant changes: introduce new spectrums and technologies, a lot of new sites and mobile Edge Computing (MEC) sinking. At the same time, as 5G […]

Expert discussion: What best practice approach should businesses take to password security?

Password protection is a critical component of a strong business cybersecurity strategy. Kevin Curran, Senior Member of the IEEE and Professor of Cybersecurity at Ulster University, says that the number one rule for companies to manage passwords securely is for their employees to use different passwords across all sites. However, in doing this, individuals often […]

The new data decade’s other disruption

Chris Greenwood, Head of UK&I at NetApp, offers an insight into how new technologies might disrupt what data looks like from an organisation’s perspective – and how this knowledge could potentially help CIOs begin preparing for the future. As we move into a new decade, with cloud computing continuing its shift from being a new […]

Why a consultative approach is the key to Digital Transformation

As consumers expect more from technology in the digital age, business leaders have no choice but to meet the growing demands of both their consumers and their employees. Jonathan Bridges, Chief Innovation Officer at Exponential-e, discusses how businesses must take note in order to achieve successful Digital Transformation. Digital technology has become so omnipresent, it’s […]

The compromise and misuse of privileged identity

As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious […]

How C-level execs can better understand insider risk

In the digital era, it is easy to be blinded by the lights of new technologies. However, this can cause us to disregard the factors which pose a threat to insider risk. Tony Pepper, CEO, Egress, discusses insider breach risks and suggests the way we understand and manage insider risk needs to change to comply […]

Why education must put IT first to stay in touch with the job market

As advancements in AI and automation transform the job market, Jack Field, Security Engineer at KHIPU Networks, describes how educational institutions have the potential to change in order to meet the global requirements of IT skills. Nothing will stop technical progression. Increasing computational power has been forcing businesses to change their expectations of employees’ IT […]

Cyber Resilience Think Tank forecasts key trends to hit the cybersecurity industry

Experts including Christina Van Houten, Chief Strategy Officer at Mimecast, forecast some of the major trends they expect to develop within the cybersecurity industry this year. Mimecast Limited, a leading email and data security company, has announced the availability of Commencing a New Decade: 2020 Predictions, the latest eBook from the Cyber Resilience Think Tank […]

When remote work doesn’t work — and how to make sure it does

In today’s modern age, it is easier than ever to give employees what they want: flexibility. Donna Kimmel, CHRO, Citrix, discusses the simple technologies that help employees become more engaged and productive, ultimately creating a better working experience. It can be tempting to think that workplace innovation is a one-size-fits-all proposition. That at any given […]

Clearing the airwaves – Debunking myths about 5G

With the introduction of new technologies comes an abundance of doubt and hearsay. Lindsay Notwell, SVP 5G Strategy and Global Carrier Relations, Cradlepoint, is here to tell us how the myths surrounding 5G are exactly that and why CIOs should consider integrating 5G into their current and next-generation wide-area network plans. The rollout of 5G […]

Browse our latest issue

Magazine Cover

View Magazine Archive