Why You Can’t Ignore the Security Risks of Cloud Misconfiguration
Cloud misconfigurations are a real and present threat to the ongoing security of the enterprise. Citrix look at how to secure your cloud infrastructure to thwart the risk.
How Businesses Can Benefit From Real-Time Alerting
Knowing the factors that affect the safety of your employees and infrastructure can be transformative. This infographic from Dataminr shows all the ways you can benefit from real-time alerting.
Jon Cosson, JM Finn CISO, Shares the Evolution of Cyber Threats...
The CEO.digital Show welcomes Jon Cosson, Head of IT and CISO at JM Finn, as we discuss the evolution of cybersecurity during this exclusive podcast interview. We learn why JM Finn was able to so rapidly respond to the problems posed by Covid-19, and how vulnerable individuals are to social engineering attacks. Listen now!
Dr Anushka Patchava, Deputy CMO at Vitality, on Why Real Transformation...
Tune into The CEO.digital Show with Dr. Anushka Patchava from Vitality to hear about using data effectively to drive personalisation and transformation.
Ramsés Gallego, International CTO at CyberRes (Micro Focus), on Protecting the...
Ramsés Gallego joins The CEO.digital Show to share his views on cybersecurity and the critical strategic pillars every enterprise should adopt.
Navigating the New Cyber Security Landscape with Rob Shapland of Falanx...
Rob Shapland, Head of Cyber Innovation at Falanx Cyber, joins us to discuss how cyber security is evolving in a hybrid world, and how modern enterprises are overcoming new challenges. Listen in for insights!
The Evolution of Ransomware & How to Stop It
As ransomware attacks have become increasingly common, sophisticated, and personalised, find out how enterprises can protect themselves.
Why Businesses Need Converged Security Now More Than Ever
Security threats in the modern world blur the boundaries between cyber and physical realms. So, is it still viable to treat them as separate departments? Read this article to learn more.
‘New Normal’ Presents DevSecOps Teams with New Security Holes to Fill
Businesses have accelerated digital transformations in light of Covid-19 to maintain operability, but their actions have expanded the attack surface. The result is a network full of security holes. In this article, we take a look at the main areas DevSecOps must address to re-secure the enterprise.