In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Phishing Five uncomfortable truths about phishing defence

It’s time to challenge conventional thinking about phishing defence and recognise that traditional approaches are not enabling us to better …

Leadership The four pillars of crisis management

Sponsored by SungardAS
Chris Huggett, Senior Vice President, EMEA & India at Sungard AS says that businesses must take stock of their vulnerabilities and …

Information security Senseon: going beyond the anomaly

Cyber-security is a complex and ever-changing problem. Companies face a huge challenge in protecting their networks and data from both …

Employee training Why are so many security professionals reluctant to openly discuss what their rules are?

Well-written and well-understood rules help everyone in an organisation succeed and minimize unproductive conflict. Why, then, are so many security …

Information security Providing a cyber-security services framework

How CyberProof’s next-gen services clarify risk and investment to help solve your organisation’s cyber-security needs. CyberProof is a security services …

Cyber risk Gaining clarity in cyber-risk and investment

You know how much you’ve been spending on cyber-security. But do you really know how effective your investment has been? …

Cyber defence Changing the game in MSS: an advanced cyber-command centre

The notorious threat-actor Carbanak was on the offensive. It had sent a phishing email to a company’s reservation centre and …

Human error Top five human errors that impact data security

A recent paper by Osterman Research reports that less than half (42 per cent) of organisations have trained their employees …

Information security Five things to know about NETSCOUT Arbor Edge Defense

NETSCOUT AED serves as the first and last line of defence against multiple types of inbound and outbound threat. NETSCOUT …

Threats NETSCOUT predicts the security trends for 2019

Our security experts forecast the important trends for the global cyber-threat landscape. Today’s pervasively connected world brings both opportunity and …

Cloud security How to secure your move to the multi-cloud

Moving to a multi-cloud environment requires an appropriate security approach to ensure your data, applications, and systems stay protected. Steve …

Human error What can Snoopy teach us about security?

Good security depends on people responding properly to a wide range of cyber threats. To train people effectively, you first …