Insights

Editor’s Question:  Have passwords had their time?

Industry views on the future for access authentication. Stuart Wells, CTO, Jumio  To protect users in an increasingly connected world, organisations must adopt more robust and reliable methods of passwordless...

Securing SAP in the public cloud: Navigating the shared responsibility model

Zane Wilson, SVP, SAP Architecture EMEA, Lemongrass, on bringing the concept of shared responsibility to cloud security. As enterprises continue to embrace cloud computing, the adoption of public Cloud platforms for...

How threat intelligence can improve vulnerability management outcomes

Chris Jacob, Global Vice President, Threat Intelligence Engineers, ThreatQuotient, says an ever-evolving threat landscape needs a structured and efficient risk-based process for managing vulnerabilities. It might...

AI, quishing and multi-channel attacks top phishing trends

Egress report reveals millennials are the key target. The third Phishing Threat Trends Report from Egress explores evolving payloads, AI’s rise in cybercrime, the success of multi-channel attacks and how secure...

Genetec: Physical security is ‘speeding towards the cloud’

The adoption of cloud for physical security is accelerating after a decade of gradual progress, the Genetec Global Press Summit 2024 heard. Presenting Genetec’s State of Physical Security 2024 report, Andrew...

DataStax releases top five Generative AI predictions for 2024

Companies leading with data will come out ahead in the race to win with Generative AI technology. DataStax has released its top predictions for 2024, seeing many companies cement their place in the market –...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive