Insights

When remote work doesn’t work — and how to make sure it does

In today’s modern age, it is easier than ever to give employees what they want: flexibility. Donna Kimmel, CHRO, Citrix, discusses the simple technologies that help employees become more engaged and productive,...

Clearing the airwaves – Debunking myths about 5G

With the introduction of new technologies comes an abundance of doubt and hearsay. Lindsay Notwell, SVP 5G Strategy and Global Carrier Relations, Cradlepoint, is here to tell us how the myths surrounding 5G are...

What will the future hold for security when everything is constantly...

In order to keep up with the rate at which technology is evolving, CISOs and their security teams must be mindful of the areas of change. Marco Rottigni, Chief Technical Security Officer EMEA, Qualys, offers seven...

Six critical attack vectors to watch out for in your data centre

Data centres can be considered a silver-bullet to a successful hack if an attacker gets their hands on the data they contain. Matt Walmsley, EMEA Director, Vectra, highlights the most critical attack vectors that...

How should businesses and organisations protect against insider threats?

Protecting against insider threats is something all businesses have to manage and is an ongoing process. Shareth Ben, Insider Threat SME at Securonix, discusses a best practice approach for detecting and protecting...

Securing Digital Transformation success: A four step guide

To think that Digital Transformation will mean avoiding cyber risks is naive and we need to turn our attention to how we manage the risks presented to us as a result. Chris Miller, Regional Director – UK & Ireland a...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive