In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Leadership How to ensure your IT strategy is strategic, not reactive

Julian Box, CEO at data privacy specialist Calligo, discusses how companies can ensure that their outsourced IT partners deliver value …

Cyber skills 5 ways a CISO can tackle the cyber security skills shortage now

Migo Kedem, Senior Director, Products & Marketing at SentinelOne, outlines practical steps CISOs can take now to tackle the cyber …

Mental health Cyber security burnout: risks and remedies

Craig Hinkley, CEO, WhiteHat Security considers how can we all balance the demands of the job with personal well-being to …

Phishing A guide to phishing emails and how they work

The most efficient phishing attacks are precisely crafted messages that use our known psychological attributes against us, stimulating us to …

Cyber skills Amid rising stress levels, 50% of cyber security professionals choosing vCISO as career option

As many as three-quarters of organisations are struggling with an acute shortage of cyber security personnel and this has put …

Training Cyber security through storytelling: which approach will motivate your users?

Oh no! The users have learned about a terrible new cyber threat and want immediate guidance! What do you do? …

Information security Redefining security for real-time enterprise in 2019

Last year was a year of digital acceleration, as new technologies such as 5G, artificial intelligence and next-gen cloud moved …

Leadership From cinema to reality – three things every business can learn from disaster movies

Sponsored by SungardAS
In dramatic style, Kathy Schneider, CMO, Sungard Availability Servic, outlines three things every business can learn from disaster movies... We …

Cyber skills Five key considerations for CISOs that are easily overlooked

Jan van Vliet, VP and GM of EMEA, Digital Guardian highlights five key points for CISOs that are often overlooked …

IAM IAM: how analytics is changing everything

idax uses entitlement information to generate insights into who has access to either data or systems they should not have. …

Information security How OneTrust helps with information security

As adequate security becomes a legal mandate, there is a greater understanding that privacy is not truly attainable without security. …

Information security What to look for when selecting an MSSP

Medium to large organisations increasingly rely on managed security service providers (MSSPs) to deliver security monitoring, threat detection and incident …