Cybersecurity

Tackling sophisticated threats with Corelight

Implementing robust cybersecurity measures, leveraging advanced technologies and fostering continuous improvement are critical steps in achieving a robust cybersecurity posture. Vijit Nair, Sr. Product Director at...

Essential strategies to protect against ransomware

Dr. Yvonne Bernard, CTO, Hornetsecurity, urges business leaders to educate themselves on the best strategies to protect their organization from ransomware attacks. Ransomware is proving to be one of the most severe...

The UK hospitality sector cannot afford to accommodate cybercriminals 

Like every industry, the hospitality industry is not immune to cyberattacks. Hotels hold large amounts of sensitive data from customers, including credit cards and home addresses, so it is vital that their...

DigiCert establishes World Quantum Readiness Day to propel future-proof...

DigiCert has announced the first World Quantum Readiness Day, which will take place on September 26, 2024. This initiative aims to spotlight the critical need for current security infrastructures to adapt to the...

How threat intelligence can improve vulnerability management outcomes

Chris Jacob, Global Vice President, Threat Intelligence Engineers, ThreatQuotient, says an ever-evolving threat landscape needs a structured and efficient risk-based process for managing vulnerabilities. It might...

Boards are overwhelmed with data

Simon Berglund, Snr Vice President & General Manager, Asia Pacific, Diligent, on the part CIOs can play in balancing data and compliance. Boardrooms are under more pressure than ever before. Facing greater...

Browse our latest issue

Intelligent CXO

View Magazine Archive