Magazine Button

Insights

How to manage network risk using fluid security

With organisations utilising new technologies in the age of Digital Transformation, it is vital that the security surrounding innovation is up to standard. Amrit Williams, Vice President of Products at Skybox Security, tells us why fluid security’ practices are so important in developing a successful security programme and thus relieving pressure for CISOs. As organisations […]


Huawei predicts 10 emerging trends in telecom energy in next five years

Huawei releases 10 emerging trends in telecom energy in 2025, aiming to provide a reference for operators on site infrastructure construction. 5G is coming. Telecom networks need to undergo these three significant changes: introduce new spectrums and technologies, a lot of new sites and mobile Edge Computing (MEC) sinking. At the same time, as 5G […]


What best practice approach should businesses take to password security?

Password protection is a critical component of a strong business cybersecurity strategy. Kevin Curran, Senior Member of the IEEE and Professor of Cybersecurity at Ulster University, says that the number one rule for companies to manage passwords securely is for their employees to use different passwords across all sites. However, in doing this, individuals often […]


Best practices for securing a remote workforce in the age of digital innovation

Digital innovation can offer many distractions to a business leader and this plays right into a cyberattacker’s hands. Alain Penel, Regional Vice President – Middle East, Fortinet, discusses how remote working can be made safer and some of the ways to avoid creating security gaps when new technology is introduced to a network. Today’s workforce […]


The compromise and misuse of privileged identity

As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how Privileged Access Management monitoring enables companies to mitigate against insider threats. It’s widely accepted by today’s cybersecurity departments that many serious […]


How C-level execs can better understand insider risk

In the digital era, it is easy to be blinded by the lights of new technologies. However, this can cause us to disregard the factors which pose a threat to insider risk. Tony Pepper, CEO, Egress, discusses insider breach risks and suggests the way we understand and manage insider risk needs to change to comply […]


Expert predicts the next generation of data centres

From the confluence of major IT trends to the increasing social demand to halt climate change, green energy is again, top of the agenda. Major changes in this area are expected to be introduced by the government, energy generation and energy distribution companies. They are the major forces that construct the energy market and will […]


Cyber Resilience Think Tank forecasts key trends to hit the cybersecurity industry

Experts including Christina Van Houten, Chief Strategy Officer at Mimecast, forecast some of the major trends they expect to develop within the cybersecurity industry this year. Mimecast Limited, a leading email and data security company, has announced the availability of Commencing a New Decade: 2020 Predictions, the latest eBook from the Cyber Resilience Think Tank […]


When remote work doesn’t work — and how to make sure it does

In today’s modern age, it is easier than ever to give employees what they want: flexibility. Donna Kimmel, CHRO, Citrix, discusses the simple technologies that help employees become more engaged and productive, ultimately creating a better working experience. It can be tempting to think that workplace innovation is a one-size-fits-all proposition. That at any given […]


What will the future hold for security when everything is constantly changing?

In order to keep up with the rate at which technology is evolving, CISOs and their security teams must be mindful of the areas of change. Marco Rottigni, Chief Technical Security Officer EMEA, Qualys, offers seven predictions where he thinks security will develop most this year. Hacks still happen, software vulnerabilities get discovered and patches […]


Six critical attack vectors to watch out for in your data centre

Data centres can be considered a silver-bullet to a successful hack if an attacker gets their hands on the data they contain. Matt Walmsley, EMEA Director, Vectra, highlights the most critical attack vectors that sophisticated attackers tend to use against data centres. Data centres and the wealth of information they contain, represent a tantalising prize […]


How should businesses and organisations protect against insider threats?

Protecting against insider threats is something all businesses have to manage and is an ongoing process. Shareth Ben, Insider Threat SME at Securonix, discusses a best practice approach for detecting and protecting against insider threats, as well as bringing awareness to the different types. One of the biggest threats organisations currently face is from those […]


Browse our latest issue

Magazine Cover

View Magazine Archive