Analysis

Thwart cybercrimes by making cyber-resilience your last line of defense

Connecticut-based Ryan Weeks, CISO, Datto, tells us how organizations are starting to take a new approach to mitigating their cybersecurity with cyber-resilience providing a focus on keeping systems up and running...

Study confirms IoT devices are source of security compromise

A study from Zscaler reveals a 700% increase in IoT-specific malware and reports most IoT attacks originated in China, the United States and India. Zscaler, a leader in cloud security, has released a new study...

One person in four risks sharing confidential work-related information

KnowBe4 Research reveals the results of a survey that found that nearly a quarter of employees are unsure whether the information they are working with is confidential or not. A new survey carried out by KnowBe4...

Five keys to mitigating today’s ransomware risks

Dmitry Dontov, CEO and Chief Architect of Spin Technology, considers the best ways to approach modern ransomware prevention in the modern workplace. Ransomware attacks grew by 435% in 2020 compared to 2019 and this...

Fast innovation requires a positive DevOps culture not just tools

Sam Hunt, VP APAC at GitHub, outlines common areas for businesses to focus on if they are to get maximum value from their DevOps investments. Has there ever been a more contentious term in the history of software...

How we respond today impacts our security tomorrow

Lior Div, CEO and Co-founder, Cybereason, asks how the US government should respond to the threat of persistent and highly damaging cyberattacks and considers what strategies should be deployed to reverse the...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive