Top Stories

Keeping compliant as Australia’s workforce defaults to digital

1 August 2022

Jeremy Paton, Team Engagement Solutions Lead, APAC, Avaya, examines how evolving consumer habits and expectations can affect the cybersecurity of businesses while staying compliant. Australia’s appetite for digital services is rampant. While...

Dragos expert on why the energy sector must take a proactive approach to cyberdefence

27 July 2022

The energy sector has undergone immense digitalisation in recent years as organisations have adopted digital tools to help achieve their transition towards net zero. But this has also introduced new risks and threats which need to be addressed to stay ahead...

Editor’s Question: How can organizations improve their cloud security?

23 June 2022

The 2022 Thales Cloud Security Report reveals that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the previous year, raising greater concerns regarding protecting sensitive data from...

Why immersive customer experience gives superpowers to your consumers  

20 June 2022

Simple, convenient and visually attractive were the ideal CX, but this has become the expected norm. Now CX leaders need to create immersive customer experiences and produce positive emotional outcomes. Alex Smith-Bingham, Group Offer Lead for...

Dragos expert on enhancing visibility and building a healthy defensive cyber posture 

17 June 2022

As cyberthreats continue to increase across Europe, there is a need to enhance the cyber posture of organisations across industries. Magpie Graham, Adversary Hunting Technical Director, Dragos, tells Intelligent CISO’s Jess Abell about the gaps in the...

‘Safeguarding civilisation’: Protecting critical infrastructure against cyberattacks

16 June 2022

Research from Dragos has highlighted that the industrial sector attracted increased unwanted attention from adversaries last year. With attackers continuing to up the ante and the consequences of an attack proving potentially devastating, defenders must...

How much is enough? How to build a targeted and sustainable cybersecurity budget

10 June 2022

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at LogRhythm, explores what the right amount...

How to remain cybersecure with ‘bringing your own devices’ 

10 June 2022

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with cyberattacks as of late and why it is therefore essential for organisations to address potential risks before implementing...

Why incident response and insurance must learn to be bedfellows

1 June 2022

Dominic Trott, UK Product Manager, Orange Cyberdefense, tells us why maintaining a good understanding of your security posture is paramount, as well as the factors which contribute to a defence-in-depth approach to cybersecurity – an approach he...

Counting the cost of the biggest BEC attacks

1 June 2022

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types...