www.intelligentciso.com Open in urlscan Pro
2606:4700:3036::6815:35ef  Public Scan

Submitted URL: http://intelligentciso.com/
Effective URL: https://www.intelligentciso.com/
Submission: On September 24 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.intelligentciso.com/

<form role="search" method="get" class="search-form" action="https://www.intelligentciso.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: subscribePOST https://list.mailigen.com/subscribe/post

<form name="subscribe" class="subscribe" action="https://list.mailigen.com/subscribe/post" method="post">
  <input type="hidden" name="subscribe" value="true">
  <input type="hidden" name="ln" value="en">
  <input type="hidden" name="u" value="0f993207d1f399d38d960ece5fa871ea">
  <input type="hidden" name="id" value="d2d4768d">
  <div class="subscribe-form">
    <div class="email-address-field">
      <input type="text" class="text" name="merge[0]" accept="email" value="" placeholder="Enter your email address">
    </div>
    <div class="button"><button id="formSubmit" name="submit" type="submit">Sign up</button><input type="image" name="submit" alt="Subscribe" src="" style="display:none"></div>
  </div>
</form>

Name: subscribePOST https://list.mailigen.com/subscribe/post

<form name="subscribe" class="subscribe" action="https://list.mailigen.com/subscribe/post" method="post">
  <input type="hidden" name="subscribe" value="true">
  <input type="hidden" name="ln" value="en">
  <input type="hidden" name="u" value="0f993207d1f399d38d960ece5fa871ea">
  <input type="hidden" name="id" value="d2d4768d">
  <div class="subscribe-form">
    <div class="email-address-field">
      <input type="text" class="text" name="merge[0]" accept="email" value="" placeholder="Enter your email address">
    </div>
    <div class="button"><button id="formSubmit" name="submit" type="submit">Sign up</button><input type="image" name="submit" alt="Subscribe" src="" style="display:none"></div>
  </div>
</form>

Text Content

Skip to content

Intelligent CISO

Covering Security Across Borders

 * Home
 * Regions
   * Africa
   * Europe
   * Middle East
   * APAC
   * North America
 * Technology
   * Network
   * Physical
   * Data
 * Analysis
   * Blogs
   * Insights
   * Case Studies
 * Videos
 * Podcasts
 * Whitepapers
 * Content Hubs
   * Forescout
 * Contact Us
 * Other Sites
   * Intelligent CIO
   * Intelligent Data Centres
   * Intelligent Tech Channels
   * Intelligent SME.tech
   * Intelligent CXO
   * Intelligent Briefings
   * CXO Priorities

Search for:

LATEST NEWS
Research identifies ransomware as top security threat between April-June 2021
Nokia addresses network security as part of its 5G certification program
Mimecast launches AI-enabled solution to battle evasive email threats
Vectra AI reveals cybersecurity blind spots in PaaS and IaaS environments with
security survey
Optus notifies customers of cyberattack compromising customer information
Uber investigates huge data breach
Improving cybersecurity with Managed Security Services Providers
NetWitness to showcase NetWitness Platform XDR 12 at GITEX
Trellix launches Trellix Advanced Research Center, finds estimated 350,000
open-source projects...
X


BEFORE YOU GO, KEEP UP-TO-DATE BY...


FOLLOWING US ON SOCIAL MEDIA




SIGNING UP TO OUR NEWSLETTER

Sign up



OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION


UBER INVESTIGATES HUGE DATA BREACH


IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS


NETWITNESS TO SHOWCASE NETWITNESS PLATFORM XDR 12 AT GITEX

 1.  
 2.  
 3.  
 4.  


OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION


UBER INVESTIGATES HUGE DATA BREACH


IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS


NETWITNESS TO SHOWCASE NETWITNESS PLATFORM XDR 12 AT GITEX

 1.  
 2.  
 3.  
 4.  



Intelligent Video Conferencing Partner



Global ICIO Knowledge Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Digital Transformation Partner



Intelligent Partner



Intelligent Partner



Intelligent Partner



Intelligent Email Protection Partner




MORE NEWS

14th September 2022

PROOFPOINT TO PROMOTE BETTER PROTECTION OF CRITICAL INFORMATION AT GITEX 2022

9th September 2022

SNOWPLOW EXPERT ON UTILISING PREDICTION MODELS TO ACHIEVE COMPETITIVE...

30th August 2022

SPOTLIGHT SERIES: PAUL DAVIS, DIRECTOR OF FRAUD PREVENTION, TSB BANK

17th August 2022

HIVE, LOCKBIT AND BLACKCAT RANSOMWARE GANGS CONSECUTIVELY ATTACK THE SAME...

11th August 2022

NETSKOPE – SECURITY THAT’S READY FOR ANYTHING

4th August 2022

EATON: TRIPP LITE PRODUCTS RANGES

27th July 2022

DIGITAL FORUM: DRAGOS AND EMERSON EXPERTS DISCUSS SECURING CRITICAL...

26th July 2022

Q&A WITH JOHN GRAHAM-CUMMING, CTO, CLOUDFLARE

26th July 2022

TANIUM EXPERT ON HOW ORGANISATIONS CAN BUILD AN EFFECTIVE DEFENCE AGAINST...

22nd July 2022

DEEP DIVE: ZAC WARREN, CHIEF SECURITY ADVISOR, EMEA, TANIUM


EVENTS

 * Mon
   10
   Oct
   2022
   Fri
   14
   Oct
   2022
   
   
   GITEX
   
   Dubai World Trade Centre
   
   Find out more. 


INSIGHTS

AGILE IT: THE ROLE OF THE CISO IN COMBATTING THE RISKS OF THE ‘MOVE FAST, FAIL
FAST’ CUL...

Agile IT must be implemented with due caution, says Taj El-khayat, Managing
Director – South EMEA at Vectra AI. Here he discusses...

DRAGOS EXPERT ON WHY THE ENERGY SECTOR MUST TAKE A PROACTIVE APPROACH TO
CYBERDEFENCE

The energy sector has undergone immense digitalisation in recent years as
organisations have adopted digital tools to help achieve their...

HOW MUCH IS ENOUGH? HOW TO BUILD A TARGETED AND SUSTAINABLE CYBERSECURITY BUDGET

Ensuring cybersecurity investments align with the business’ goals is a key
element of success, however, managing the two...

HOW TO REMAIN CYBERSECURE WITH ‘BRINGING YOUR OWN DEVICES’ 

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster
University, discusses the stark figures associated with...

 1.  
 2.  
 3.  
 4.  




VIDEOS

DEEP DIVE: NICK KING, CHIEF PRODUCT AND MARKETING OFFICER, SNOWPLOW



DEEP DIVE: DAN PITMAN, DIRECTOR OF PRODUCT AND TECHNICAL MARKETING AT...

SPOTLIGHT SERIES: PAUL DAVIS, DIRECTOR OF FRAUD PREVENTION, TSB BANK


NETWORK

IOT AND OT SECURITY: THE CHALLENGES, BENEFITS AND WHY YOU SHOULD CARE

TOUGH NEW RULES CONFIRMED TO PROTECT UK TELECOMS NETWORKS AGAINST...

JUNIPER NETWORKS AND DRAGOS PARTNER TO SECURE CRITICAL INFRASTRUCTURE


PHYSICAL

ROMANIA EQUIPS ITS PRISONS WITH BODY-WORN CAMERA TECHNOLOGY FROM MOTOROLA
SOLUTIONS

CHECK POINT SOFTWARE AND PROVISION-ISR TO PROVIDE ON-DEVICE IOT SECURITY...

MOTOROLA SOLUTIONS ACQUIRES RUGGEDISED VIDEOTEC


DATA

OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION

UBER INVESTIGATES HUGE DATA BREACH

DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION...

 1.  
 2.  
 3.  


THOUGHT LEADERSHIP

IMPROVING CYBERSECURITY WITH MANAGED SECURITY SERVICES PROVIDERS

Jon Pratt, CIO at 11:11 Systems, discusses cybersecurity resourcing and the
benefits of Managed Security Services....

WHAT IS GOOD CLOUD MIGRATION SECURITY?

Cloud adoption continues to be important for many organizations as they
transform how they do business in...

FUTURE IS FEMALE FOR DATA DEFENDERS

Mark Bowen, Editor of Intelligent CIO North America, says the future of the
cybersecurity industry, and therefore the...

BITDEFENDER EXPERT ON BUILDING A RESILIENT ENTERPRISE SECURITY STRATEGY

Enterprises are becoming increasingly concerned with the future of their
security strategy post-pandemic. Dan Pitman,...

AGILE IT: THE ROLE OF THE CISO IN COMBATTING THE RISKS OF THE ‘MOVE FAST, FAIL
F...

Agile IT must be implemented with due caution, says Taj El-khayat, Managing
Director – South EMEA at Vectra AI....


LATEST WHITEPAPERS

Palo Alto Networks
A Pragmatic Approach to Implementing Zero Trust with...

Download

Palo Alto Networks
Key Considerations for a Successful ZTNA Deployment

Download

Palo Alto Networks
Cover Your SaaS with the Next Evolution of CASB

Download

Palo Alto Networks
Why Your SASE Deployment Should Start with ZTNA 2.0

Download

Palo Alto Networks
Top Three Use Cases to Make ZTNA 2.0 a Reality Today

Download

Proofpoint
State of the Phish Webinar OnDemand

Download

BlackBerry
Why SMBs must prioritise a prevention-first approach...

Download

Alcatel-Lucent Enterprise
Why Unified Communications as a Service (UCaaS)...

Download

Alcatel-Lucent Enterprise
Asset Tracking and Contact Tracing in Healthcare

Download

Alcatel-Lucent Enterprise
Empower student success with digital transformation

Download

Alcatel-Lucent Enterprise
Smarter, greener, more secure transportation through...

Download

Alcatel-Lucent Enterprise
Smart City Network Architecture Guide

Download

Alcatel-Lucent Enterprise
A digital workplace enables next-generation public...

Download

Alcatel-Lucent Enterprise
Cybersecurity in governments and smart cities

Download

Alcatel-Lucent Enterprise
The Scottish Government: Centralise and secure their...

Download

Alcatel-Lucent Enterprise
How to secure your smart campus in the age of...

Download

Alcatel-Lucent Enterprise
Wembley Park: Alcatel-Lucent Enterprise brings smart...

Download

Alcatel-Lucent Enterprise
Smart highways reduce congestion and save lives

Download

Alcatel-Lucent Enterprise
Hospital of the Future

Download

Salesforce
Marketing Intelligence Report

Download

Salesforce
State of Service

Download

Salesforce
How To Sell

Download

Barracuda
How SASE empowers your business for the cloud...

Download

Barracuda
The state of Office 365 backup

Download

Barracuda
Spear Phishing: Top Threats and Trends

Download

Barracuda
Don’t pay the ransom

Download

Barracuda
The new ABCs of application security

Download

Palo Alto Networks
Zero Trust With Zero Exceptions

Download

Finesse
Robotic Process Automation

Download

Unit 42
Forrester 2021 State of Enterprise Security

Download

Palo Alto Networks
Palo Alto Networks Cloud-Delivered Security Services...

Download

Palo Alto Networks
10 Things to Test in Your Future Next-Generation...

Download

Palo Alto Networks
Security Orchestration Automation andResponse...

Download

Cortex
Market Guide for Extended Detection and Response

Download

Cortex
The Forrester New Wave™: Extended Detection And R...

Download

Cortex
The Essential Guide to XDR

Download

Cortex
Surviving Ransomware — What You Need to Know

Download

Palo Alto Networks
The Forrester New Wave™: Zero Trust Network Access, Q...

Download

Palo Alto Networks
Ten Considerations for Evaluating Zero Trust Network...

Download

Palo Alto Networks
Secure Transformation: Replacing Remote Access VPN...

Download

Palo Alto Networks
Availability and Buying Options in the Emerging SASE...

Download

Palo Alto Networks
Small Business Firewall Guide

Download

Palo Alto Networks
Next-Generation Firewall Buyer’s Guide

Download

Palo Alto Networks
The Total Economic Impact Of Palo Alto Networks For...

Download

Palo Alto Networks
The Total Economic Impact™ Of Palo Alto Networks V...

Download

Palo Alto Networks
Five Key Challenges in Private Cloud Security

Download

Palo Alto Networks
Secure Devices Faster at 70 Times Savings

Download

Whitesource
Facing the Log4j Vulnerability Head On The Risk and...

Download

Unit 42
2022 Unit 42 Ransomware Threat Report

Download

Dragos
Understanding The Challenges of OT Vulnerability...

Download

Dragos
Industrial Cyber Risk Management

Download

Dragos
An Executive’s Guide to Industrial...

Download

Dragos
Executive Summary ICS/OT Cybersecurity Year in...

Download

Dragos
ICS/OT Cybersecurity Year in Review 2021

Download

VMware
Sharing the Workload of Workload Security Whitepaper

Download

VMware
Cloud Workload Protection: How to Secure Workloads...

Download

ServiceNow
Transformation of Workflows via a Platform Approach...

Download

Palo Alto Networks
Endpoint Prevention and Response EPR Comparative...

Download

Palo Alto Networks
Protect Kubernetes Environments with CN-Series...

Download

Palo Alto Networks
Securing Multi-Cloud Environments with VM-Series...

Download

Palo Alto Networks
An Executive’s E-Guide to Protecting Workloads and D...

Download

Palo Alto Networks
Your Hybrid Infrastructure Is Under Attack

Download

Palo Alto Networks
Next Generation Firewall (NGFW) Competitive...

Download

Palo Alto Networks
Enterprise Data Loss Prevention, Revisited

Download

Palo Alto Networks
Protect Every Device with a 6-Step Approach to...

Download

Unit 42
IDC: The Critical Nature of Incident Readiness and...

Download

Unit 42
How to Survive a Breach

Download

Cortex
How To Prepare for the Next Big Cyberattack

Download

Cortex
An Origin Story: The Role Security Orchestration,...

Download

Cortex
Security Orchestration for Dummies

Download

Palo Alto Networks
2020 Unit 42 IoT Threat Report

Download

Palo Alto Networks
NEXT Is CASB That Actually Secures Your SaaS

Download

Palo Alto Networks
The Evolution of Cloud Access Security Brokers

Download

Cortex
Top Security Orchestration Use Cases

Download

Cortex
The State of Security Automation

Download

Lookout
Cloud and mobile reliance pushes financial services...

Download

Lookout
Integrating security from endpoint to cloud

Download

Lookout
Lookout CASB for Microsoft Office 365

Download

Lookout
The Authoritative Guide to the Top CASB Use Cases

Download

Unit 42
Ransomware Threat Report 2021

Download

Unit 42
An Ounce of Prevention: Investing in Incident...

Download

Unit 42
Market Guide for Digital Forensics and Incident...

Download

Illumio
How to Stop Ransomware Attacks

Download

Illumio
Enable End-to-End Zero Trust To Achieve Effective...

Download

Illumio
How to Prevent Ransomware From Becoming a Cyber...

Download

DriveLock
Whitepaper: DriveLock Vulnerability Management

Download

DriveLock
From concept to implementation: 6 steps to greater...

Download

Palo Alto Networks
Meet the Ultimate SASE Trailblazer Customers

Download

Palo Alto Networks
How Palo Alto Networks Enabled the Future of Work...

Download

Palo Alto Networks
Elevating SASE Security: What’s New in Prisma...

Download

Palo Alto Networks
Convergence without Compromise: Introducing Prisma...

Download

Palo Alto Networks
XDR For Dummies

Download

Palo Alto Networks
Navigating the SaaS Security Jungle

Download

Palo Alto Networks
Overcoming Enterprise Data Protection Challenges

Download

Palo Alto Networks
The Enterprise Buyer’s Guide to Integrated CASB

Download

Palo Alto Networks
The Essential Guide to Phishing Investigation and...

Download

Palo Alto Networks
The Essential Guide to Rapid Response Against...

Download

Palo Alto Networks
How Security Approaches Must Evolve to Address...

Download

Palo Alto Networks
Data Center and Hybrid Cloud Security for Dummies

Download

Palo Alto Networks
10 Things to Test in Your Future Next-Generation...

Download

Palo Alto Networks
5 Must-Haves to Look For in a Best-in-Class IoT...

Download

Palo Alto Networks
The Role of a Modern Enterprise DLP Solution in...

Download

Amazon Payment Services
Keep your customers coming back.

Download

Proofpoint
The 2021 Ransomware Survival Guide

Download

Proofpoint
The Human Factor 2021

Download

Proofpoint
The Hidden Costs of Free

Download

Fireware
IBM Security Guardium Insights for IBM Cloud Pak for...

Download

Fireware
The Guardium Integration Application for IBM...

Download

Fireware
The Total Economic Impact Of IBM Security Guardium

Download

Fireware
Five common data security pitfalls to avoid

Download

Cortex
The Essential Guide to the MITRE ATT&CK...

Download

Cortex
What’s Next for Next-Gen Antivirus?

Download

Cortex
How SOAR Is Transforming Threat Intelligence

Download

Cortex
The State of SOAR Report, 2020

Download

Unit 42
Investing in Incident Readiness: 2021 ESG E-Book

Download

Unit 42
2021 Unit 42 Ransomware Threat Report

Download

Dragos
Global Electric Cyber Threat Perspective

Download

Dragos
An Executive’s Guide to Industrial Cybersecurity

Download

Dragos
A Guide to Understanding the 2021 MITRE Engenuity...

Download

AWS
How to Execute a Data-Driven Approach to Cloud...

Download

AWS
Manage your Cloud Migrations

Download

AWS
Running Windows Workloads on AWS

Download

AWS
Get better performance, security and availability...

Download

AWS
Are you utilizing all the compute resources that you...

Download

AWS
Migrate and Host your Microsoft Workloads on AWS...

Download

Forcepoint
2021 Gartner Strategic Roadmap for SASE Convergence

Download

Forcepoint
Market Guide for Data Loss Prevention

Download

Forcepoint
Risk-Adaptive Data Protection: Stop Breaches Enable...

Download

Forcepoint
The Rise of the Hybrid Workforce Security—Bringing S...

Download

Forcepoint
The Practical Executive’s Guide To Data Loss...

Download

Forcepoint
Enterprise Data Protection Solutions, Explained

Download

Forcepoint
Risk-Adaptive Data Protection: The Behavior-Based...

Download

Forcepoint
White Paper: Your Executive’s Guide to SASE Success

Download

Forcepoint
Quantifying the Benefits of SASE: ESG Research...

Download

Forcepoint
Which SASE Architecture is Right for You?

Download

OKTA
5 Ways Smart Executives Capture Value with Modern...

Download

Fortinet
Effective AI-Driven Security Operations

Download

spiderSilk
An Overview of Attack Surface Management

Download

CyberArk
A Defense-in-depth Perspective on Ransomware

Download

CyberArk
Best Practices for Ransomware Protection

Download

CyberArk
Full Disclosure: Ransomware Exposed

Download

CyberArk
4 Steps To Protect What Attackers Are Really After

Download

Rapid7
4 Key Pillars of Modern Vulnerability Risk...

Download

Rapid7
Optimize Security Operations with Automation

Download

Rapid7
Driving Immediate Value with a Cloud SIEM

Download

Rapid7
2021 Cloud Misconfigurations Report

Download

Strata
10 Things to Test in Your Future Next-Generation...

Download

Strata
4 Key Elements of an ML-Powered NGFW

Download

Strata
Next-Generation Firewall Buyer’s Guide

Download

Strata
The Total Economic Impact Of Palo Alto Networks For...

Download

ServiceNow
IT Service Management Is Advancing With The Times

Download

ServiceNow
The Total Economic Impact Of ServiceNow IT Business...

Download

ServiceNow
The Total Economic Impact Of ServiceNow Customer...

Download

IBM
Cost of a Data Breach Report 2021

Download

Netscout
5 Things Ransomeware and DDoS Attacks Have in Common

Download

Netscout
DDoS Attacks Have Changed 5 Things You Need to Know

Download

Netscout
Multinational Bank Thwarts DDoS Attack to Repair...

Download

Netscout
5 Things You Maybe Didn’t Know About DDoS...

Download

Orange
Security Navigator 2021

Download

Arcserve
Safeguard your data with immutable storage

Download

Fortinet
Exploring Transformation and Trust in the Digital...

Download

Fortinet
Exploring Transformation and Trust in the Digital...

Download

Fortinet
Exploring Transformation and Trust in the Digital...

Download

Fortinet
10 Questions To Ask Before Making a Security...

Download

Fortinet
5 Mistakes To Avoid When Evaluating Your Next...

Download

Fortinet
Understanding FortiOS— The Heart of the Fortinet S...

Download

Fortinet
Securing OT in the Face of IIoT and 5G

Download

Fortinet
5 Challenges with Hybrid and Hyperscale Data Center...

Download

Fortinet
Critical Considerations for Securing Hybrid and...

Download

Fortinet
Fortinet Delivers the Most Flexible SASE Solution

Download

Fortinet
How to Achieve Optimal Internal Segmentation with...

Download

Fortinet
Grow Business with Secure Hybrid and Hyperscale Data...

Download

Fortinet
How To Achieve Secured Wired and Wireless Networks

Download

Fortinet
SD-WAN in the Age of Digital Innovation

Download

Fortinet
SD-WAN Isn’t Just for Retail

Download

Fortinet
Selecting Your Next-Generation Firewall Solution

Download

Fortinet
The 5 Keys to Self-Healing, Secure SD-WAN

Download

Fortinet
The Importance of Self-Healing SD-WAN

Download

Fortinet
The Network Leader’s Guide to Secure SD-WAN

Download

Fortinet
Effective Security-Driven Networking

Download

Fortinet
Top 5 Considerations for Deciding Whether to...

Download

Fortinet
Why Specialized Skills and Tools are Needed for...

Download

OKTA
Have passwords really had their day?

Download

OKTA
Is convenience still king? Why good user experience...

Download

OKTA
CIAM for Dummies Guide

Download

OKTA
IDaaS For Dummies

Download

OKTA
Transforming customer experiences

Download

OKTA
Build vs. Buy

Download

OKTA
Decoding Customer IAM (CIAM) vs. IAM

Download

BlackBerry
Replacing Legacy AV

Download

BlackBerry
Perspectives on life after McAfee

Download

BlackBerry
BlackBerry vs. Traditional AV Solutions

Download

BlackBerry
5 Tips for Evaluating AI-Driven Security Solutions

Download

BlackBerry
10 Signs It’s Time To Review Your Endpoint P...

Download

BlackBerry
Security That Travels and Adapts to You

Download

BlackBerry
Don’t Compromise on Security in a Crisis

Download

BlackBerry
BlackBerry Digital Workplace

Download

ThoughtSpot
Dashboards are dead: How modern cloud analytics is...

Download

AEM
Infrastructure and PoE Considerations for Security...

Download

AEM
Ensuring Cable Readiness for IoT Deployments

Download

Arcserve
Ransomware Readiness Assessment: A Proactive...

Download

Arcserve
Protecting The Backup: The New 3-2-1-1 Rule

Download

Arcserve
Proactive Ransomware Defense and Orchestrated...

Download

Arcserve
Guaranteed data recovery from a ransomware attack or...

Download

Arcserve
Assure a Ransomware-Free-Future with Arcserve and...

Download

Netskope
SASE and the Seven Forces Shaping Security...

Download

Netskope
eBook – Digital Transformation Needs a More...

Download

Netskope
Cloud and Threat Report – February 2021

Download

VMware
UK Security Insights Report

Download

Netskope
10 Critical Security Projects and How Netskope Can...

Download

Palo Alto Networks
A Pragmatic Approach to Implementing Zero Trust with...

Download

Palo Alto Networks
Key Considerations for a Successful ZTNA Deployment

Download

Palo Alto Networks
Cover Your SaaS with the Next Evolution of CASB

Download

Palo Alto Networks
Why Your SASE Deployment Should Start with ZTNA 2.0

Download


WHITEPAPERS

Palo Alto Networks
A Pragmatic Approach to Implementing Zero Trust with SASE

Palo Alto Networks
Key Considerations for a Successful ZTNA Deployment

Palo Alto Networks
Cover Your SaaS with the Next Evolution of CASB

Palo Alto Networks
Why Your SASE Deployment Should Start with ZTNA 2.0

Palo Alto Networks
Top Three Use Cases to Make ZTNA 2.0 a Reality Today

Proofpoint
State of the Phish Webinar OnDemand


 * Middle East
 * Africa
 * Europe
 * APAC
 * North America

GISEC GLOBAL LAUNCHES CISO CIRCLE

Dubai, United Arab Emirates, 19 September 2022: GISEC GLOBAL, the most connected
and influential cybersecurity exhibition and conference in the Middle East and
Africa (MEA), has launched its CISO Circle platform for chief information
security officers, government leaders and cybersecurity experts. CISO Circle,
the new invite-only community launched by Dubai World Trade Centre, the
organisers […]

DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION...

HUAWEI TO ADDRESS FUTURE CYBERSECURITY CHALLENGES AT CSIS 2022

GISEC GLOBAL LAUNCHES CISO CIRCLE

Dubai, United Arab Emirates, 19 September 2022: GISEC GLOBAL, the most connected
and influential cybersecurity exhibition and conference in the Middle East and
Africa (MEA), has launched its CISO Circle platform for chief information
security officers, government leaders and cybersecurity experts. CISO Circle,
the new invite-only community launched by Dubai World Trade Centre, the
organisers […]

PROTECTING AN ORGANISATION’S MOST VALUABLE ASSET: WHY A SOLID DATA M...

BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2...

ROMANIA EQUIPS ITS PRISONS WITH BODY-WORN CAMERA TECHNOLOGY FROM MOTOROLA
SOLUTIONS

The Romanian National Administration of Penitentiaries has signed a contract
with Motorola Solutions to deploy 2100 body-worn cameras to enhance safety and
security in all prisons across the country. The new cameras will be used by
prison staff during guarding activities and prisoner transport to help deter and
de-escalate confrontations and collect video footage in […]

TOUGH NEW RULES CONFIRMED TO PROTECT UK TELECOMS NETWORKS AGAINST...

SECURITY, SPEED AND CONVENIENCE AT THE HEART OF TSB’S NEW CUSTOMER O...

BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2 MILLION PER
MONTH

Barracuda, a trusted partner and leading provider of cloud-first security
solutions, has released its fourth-annual threat research report on ransomware.
The new report looks at ransomware attack patterns that occurred between August
2021 and July 2022. For the 106 highly publicised attacks Barracuda researchers
analysed, the dominant targets are still five key industries: education (15%),
[…]

CRYPTO-CRIMINAL ACTIVITY HAS FALLEN IN 2022 WITH ILLICIT CRYPTOCURRENCY...

JUMIO REVEALS THREE KEY FINDINGS FROM ITS DIGITAL IDENTITY 2022 RESEARCH

BLUEVOYANT RESEARCH REVEALS VENDORS CRITICAL TO THE MEDIA INDUSTRY FACE
SIGNIFICANT...

BlueVoyant, an industry-leading cyberdefence company, has released the findings
of a new report; Media Industry Cybersecurity Challenges: A Vendor Ecosystem
Analysis. The research found that 30% of media vendors are susceptible to
compromise via vulnerabilities discovered in their publicly accessible online
presence. These critical vulnerabilities are known to be exploitable by
malicious actors. The media […]

BARRACUDA THREAT REPORT REVEALS SPIKE IN RANSOMWARE TO MORE THAN 1.2...

CRYPTO-CRIMINAL ACTIVITY HAS FALLEN IN 2022 WITH ILLICIT CRYPTOCURRENCY...


INFOGRAPHICS

JUMIO REVEALS THREE KEY FINDINGS FROM ITS DIGITAL IDENTITY 2022 RESEARCH

Providing a digital identity to create an online account or complete a
transaction is becoming more commonplace globally. A digital...

GLOBAL ORGANISATIONS CONCERNED DIGITAL ATTACK SURFACE IS SPIRALLING OUT OF
CONTROL

Trend Micro, a leader in cloud security, has announced the findings of a new
global study indicating that organisations are struggling to...

BAD ACTORS INNOVATE, EXTORT AND LAUNCH 9.7M DDOS ATTACKS IN 2021, ACCORDING TO
REPORT

NETSCOUT Systems has announced findings from its bi-annual Threat Intelligence
Report. During the second half of 2021, cybercriminals...

STUDY FINDS PRIVACY IS NOW MISSION-CRITICAL FOR ORGANISATIONS WORLDWIDE

Cisco has published its 2022 Data Privacy Benchmark Study, an annual global
review of privacy corporate practices on the impact of...

 1.  
 2.  
 3.  
 4.  




BLOGS

VULNERABILITY ASSESSMENT, PENETRATION TESTING OR RED TEAMING: WHICH IS RIGHT...

THE CISO IN 2021: COPING WITH THE NOT-SO-CALM AFTER THE STORM

WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS: FIVE KEY...

SECURITY IS ABOUT MORE THAN THE NETWORK

A PANDEMIC OF CYBERATTACKS

RANSOMWARE 2020: A YEAR OF MANY CHANGES


CASE STUDIES

DUBAI CUSTOMS OPTS FOR DELL TECHNOLOGIES’ DATA PROTECTION SOLUTIONS TO DRIVE...

SECURITY, SPEED AND CONVENIENCE AT THE HEART OF TSB’S NEW CUSTOMER ONBOARDING
JOURNEY

WHY EDUCATING AND EMPOWERING YOUR END-USER IS KEY TO ACHIEVING ROBUST
CYBERSECURITY


LATEST PODCASTS

Karl Thedeen, CEO at Outpost24

Listen now

Simon Mair, Head of Information Security and Data Privacy at Brewin...

Listen now

Peter Jackson, Chief Data and Analytics Officer, Exasol

Listen now

Vaibhav Jain, Founder and CEO, Hubilo

Listen now

Martijn de Lange, CEO at Hermes UK

Listen now

Robin Smith, CISO, Aston Martin

Listen now

Jamie Akhtar, CEO and co-founder of CyberSmart

Listen now

Prakash Sethuraman, CISO, CloudBees

Listen now

Karl Thedeen, CEO at Outpost24

Listen now

Simon Mair, Head of Information Security and Data Privacy at Brewin...

Listen now

Peter Jackson, Chief Data and Analytics Officer, Exasol

Listen now

Vaibhav Jain, Founder and CEO, Hubilo

Listen now




BLOGS

VULNERABILITY ASSESSMENT, PENETRATION TESTING OR RED TEAMING: WHICH IS RIGHT FOR
YOUR...

THE CISO IN 2021: COPING WITH THE NOT-SO-CALM AFTER THE STORM

WHAT IT MEANS TO BE A CYBERSECURITY VENDOR FOR ENTERPRISE CLIENTS: FIVE KEY
ELEMENTS


GO PHISH

GO PHISH: ZACH POWERS, CISO AT BENCHLING

What would you describe as your most memorable achievement in the cybersecurity
industry? In security, people are often enamoured by our...

GO PHISH: MATIAS MADOU, CO-FOUNDER AND CTO OF SECURE CODE WARRIOR

We ‘go phishing’ with Matias Madou, Co-founder and CTO of Secure Code Warrior,
who tells us about life inside and...

GO PHISH: LEE WRALL, CO-FOUNDER AND DIRECTOR, EVERYTHING TECH

Lee Wrall is the Co-founder and Director of Everything Tech – a Managed Service
Provider (MSP). We speak to him about life inside...

GET TO KNOW: MICHAEL KLECK, CISO, ALCHEMER

On the lighter side of things, we ask Michael Kleck, CISO, Alchemer, what makes
him tick. What would you describe as your most memorable...

 1.  
 2.  
 3.  
 4.  




DEEP DIVE

GO PHISH: BERNARD BRANTLEY AT CORELIGHT

We ‘go phishing’ Bernard Brantley at Corelight, who tells us about life inside
and outside the office. 1. What would you describe as your most memorable
achievement in the cybersecurity industry?...



GO PHISH: PAUL CALATAYUD, CHIEF INFORMATION SECURITY AND PRIVACY OFFICER AT
AQUA...

We ‘go phishing’ with Paul Calatayud, Chief Information Security and Privacy
Officer at Aqua Security, who tells us about life inside and outside the office.
What would you describe as...



DEEP DIVE – ADAM PHILPOTT, CHIEF REVENUE OFFICER AT TRELLIX

https://intelligentbriefings.wistia.com/medias/1mxs4kcqvi?embedType=iframe&seo=false&videoFoam=true&videoWidth=640...



GO PHISH: JAMEEKA GREEN AARON, CISO OF AUTH0

We ‘go phishing’ with Jameeka Green Aaron, CISO of Auth0, who tells us about
life inside and outside the office. What would you describe as your most
memorable achievement in...



DEEP DIVE – SPENCER LICHTENSTEIN, PRODUCT STRATEGIST, RSA SECURITY

In this edition of our Deep Dive series, Spencer Lichtenstein, Product
Strategist at RSA Security, talks us through the steps organisations must take
when launching a remote SOC.
https://intelligentbriefings.wistia.com/medias/karf4qx9h2?embedType=async&seo=false&videoFoam=true&videoWidth=640...



CLOSING THE SKILLS GAP: THE ART OF FINDING AND RETAINING CYBERSECURITY TALENT

The cybersecurity skills gap is not going away any time soon. Tim Bandos, CISO
at Digital Guardian, explains how companies shouldn’t always rely on the same
channels to look for...



TAKE THE PRESSURE DOWN! FOUR WAYS TO LOWER THE STRESS LEVELS OF YOUR
CYBERSECURITY TEAM

A cyberattack is an existential threat to all companies, which puts the pressure
on cybersecurity teams. The pressure continues to increase as more staff work
from home and the skills...




LATEST THREATS

OPTUS NOTIFIES CUSTOMERS OF CYBERATTACK COMPROMISING CUSTOMER INFORMATION

Following a cyberattack, Optus, one of the largest telecommunications companies
in Australia, is investigating the possible unauthorised access of current and
former customers’ information. Upon discovering this, Optus immediately shut
down the attack. Optus is working with the Australian...

UBER INVESTIGATES HUGE DATA BREACH

Uber, one of the world’s leading automotive companies, has announced it has
suffered a data breach. In a statement released by the company, it said: ‘An
Uber EXT contractor had their account compromised by an attacker. It is likely
that the attacker purchased the contractor’s...

CYBEREASON WARNS GLOBAL CRITICAL INFRASTRUCTURE OPERATORS AFTER ATTACKS FROM
RANSOMWARE...

Cybereason has issued a global Threat Analysis Report investigating the Ragnar
Locker ransomware gang and its attacks on networks of global critical
infrastructure operators. Ragnar Locker first emerged in 2019 and since its
debut hundreds of companies have been victimised. Cybereason assesses...


RESEARCH

HIVE, LOCKBIT AND BLACKCAT RANSOMWARE GANGS CONSECUTIVELY ATTACK THE SAME
NETWORK,...

Sophos, a global leader in next-generation cybersecurity, has announced in the
Sophos X-Ops Active Adversary whitepaper, Multiple...

TCS STUDY REVEALS CYBER THREATS WITHIN DIGITAL ECOSYSTEMS MAY BE AN ENTERPRISE
BLIND...

Tata Consultancy Services (TCS) has announced findings from its TCS Risk &
Cybersecurity Study, which reveals that cyber executives...

TRELLIX REPORT FINDS BUSINESS SERVICES TOP TARGET OF RANSOMWARE ATTACKS

A report by one of the industry’s leading tech giants, Trellix, explores the
cybersecurity trends and attack methods from the first...

SAS IS A LEADER IN ANTI-MONEY LAUNDERING SAYS RESEARCH FIRM REPORT

Global AI and analytics titan SAS has been named a leader in anti-money
laundering solutions by Forrester. The Forrester Wave:...

 1.  
 2.  
 3.  
 4.  


GET INTELLIGENT CISO NEWS
DELIVERED TO YOUR INBOX

Sign up


ABOUT INTELLIGENT CISO

Intelligent CISO is a technology intelligence platform aimed at the enterprise
sector looking for updates and research driven data about cybersecurity. As part
of Lynchpin Media, this digital medium gives unparalleled advice to the global
community.

GET IN TOUCH

UK Head Office
63/66 Hatton Garden
London, EC1N 8LE
Phone: +44 (0) 20 3026 6825


Copyright © 2022 Intelligent CISO | Privacy Policy | A Lynchpin Media Brand





Browse our latest issue



View Magazine Archive

×