In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

GDPR 86% UK's most-visited websites failing GDPR compliance tests

As many as 86 percent of the top hundred most-visited websites in the United Kingdom are not compliant with GDPR …

Information security Software as a security nightmare: the risks of collaboration on the cloud

Justin Fier, Director of Threat Intelligence & Analytics discusses the major vulnerabilities seen in Software as a Service today and …

GDPR One Year Down: GDPR by the Numbers

Mike Kiser, Global Strategist and Evangelist, SailPoint paints a picture of ‘GDPR by numbers’, taking a look at the most …

Information security Cyber security ROI: how to use data insights to improve controls and protections

Tim Bandos, Vice President of Cyber Security, Digital Guardian reveals 3 ways to extract maximum value from your security-intelligence system …

Information security It’s time to kill the VPN

Kurt Glazemakers, CTO Secure Access at Cyxtera, says that legacy technologies, such as VPNs, have worked as a stop gap, …

Information security Gerald Beuchelt, CISO at LogMeIn: Why biometrics cannot be considered a true replacement for...

Gerald Beuchelt, CISO at LogMeIn, explores the practical reasons as to why biometrics cannot be considered a true replacement for …

Information security 86% of EU businesses feel vulnerable to data threats

The Thales Europe Data Threat Report 2019 has been released and reveals that over 84% of organisations in Europe use …

Information security Verizon breach report: senior executives are main targets!

The freshly released 2019 Verizon Data Breach Investigations Report highlights that financially motivated cyber-attacks are on the rise, C-level executives …

Information security Post-perimeter security: dawn of a borderless world

What impact does going mobile have on enterprises today? Tom Davison, EMEA Director at Lookout, discusses the new post-perimeter security …

Information security A practical guide to busting the “perfect security” myth

There’s no such thing as “perfect security” just like there’s no such thing as a “real” unicorn. Most people have …

Information security Redefining security for real-time enterprise in 2019

Last year was a year of digital acceleration, as new technologies such as 5G, artificial intelligence and next-gen cloud moved …

Information security What the InfoSec C-Suite needs to know about Document Management Systems

Aaron Rangel, Director of Product Management, iManage, outlines the types of attacks that DMS systems are susceptible to, as well …