Insights

Containing and securing Shadow IT and technical debt

Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware...

1,100 IT pros spotlight the security hazards of hybrid work

Anthony James, VP of Product Marketing at Infoblox, provides an insight into Infoblox’s survey into the global state of security, including the impact of remote workers. Today’s cybersecurity challenges are not that muc...

The three IT questions CIOs should be able to answer . . . but probably can’t

Kevin Brown, SVP, EcoStruxure Solutions, Secure Power Division, Schneider Electric, discusses how new disruptive technologies, hybrid and distributed IT architectures and the need for actionable data insights...

2022’s updated network security threats and five steps to optimize IT i...

Richard Barretto, CISO, Progress, provides us with an updated list of IT infrastructure security threats and worries technology and business leaders should watch out for in the rest of 2022, as well as specific steps...

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to a...

Granules India uses Veeam solutions to accelerate mission-critical backups by...

The business challenge Since 1984, Granules India has been producing high-volume, high-quality medications for global healthcare enterprises. To help control costs while maintaining exceptional production quality,...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive