Industry Expert

BlueFort expert on the crucial role of intelligence-led visibility in defending your external attack surface

7 March 2023

The rise of cloud-based technology has allowed a fast-paced expansion of external attack surfaces and as cybersecurity starts to rise on the C-level priority list, it has become clear organisations must think about risk mitigation in new ways. Josh Neame,...

GITEX 2022: Ahmad Saad, Country Manager – UAE and Qatar, Liferay

21 November 2022

Erudit AI: The phenomenon of quiet quitting and how companies can build a healthier employee culture 

27 October 2022

In the age of remote working, quiet quitting is a phenomenon that companies all around the world must grapple with. Alejandro Martinez, CEO and Co-founder at Erudit, tells Mrigaya Dham about how having the correct employee feedback tools in place can...

Deep Dive: Richard Meeus, Director of Security Technology and Strategy EMEA, Akamai

3 August 2022

Deep Dive: Kevin Brown, Schneider Electric’s Senior Vice President of EcoStruxure Solutions

25 July 2022

Deep Dive: Gregg Ostrowski, Executive CTO at Cisco AppDynamics

14 July 2022

‘Safeguarding civilisation’: Protecting critical infrastructure against cyberattacks

16 June 2022

Research from Dragos has highlighted that the industrial sector attracted increased unwanted attention from adversaries last year. With attackers continuing to up the ante and the consequences of an attack proving potentially devastating, defenders must...

How much is enough? How to build a targeted and sustainable cybersecurity budget

10 June 2022

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at LogRhythm, explores what the right amount...

Ensuring effective IT security in a world of Edge Computing

17 March 2021

Joseph Salazar, Technical Marketing Manager, and Vlado Vajdic, Solutions Engineer, both of Attivo Networks, explain how it is essential to take a multi-layered approach to security when adopting Edge Computing. Edge Computing and the Internet of Things...