Analysis

A perfect storm for supply chain attacks

Modern web architecture delivers a rich user experience. But it’s also a perfect infrastructure for supply chain attacks. Aanand Krishnan, Founder and CEO, Tala Security, tells us why it matters and what you can do a...

Report finds up to 300% increase in attacks from opportunistic targeting

A report from NTT has found a spike in application attacks as remote access becomes a common vulnerability. NTT, a world-leading global technology services provider, has launched its 2021 Global Threat Intelligence...

Why attackers continue to target the network

Corey Nachreiner, CTO at WatchGuard Technologies, tells us that there is no cybersecurity ‘silver bullet’.  He says: “The challenging part of security is that it requires a layered approach including many protection strat...

Integrating the longer-term home office into your hybrid workplace

Guido Kragten, Category Lead for Cloud Platforms at Aruba, a Hewlett Packard company, suggests three factors organizations should consider to enable their employees to successfully work from home in the long-term....

World Password Day: Password protection needs a fundamental change

On World Password Day, Krupa Srivatsan, Director of Product Marketing at Infoblox, explains techniques organizations can employ to ensure password best practice. Let’s be honest, our digital lives have us drowning in p...

Multi-cloud requires impeccable digital hygiene

Dave Russell, Vice President, Enterprise Strategy at Veeam Software, tells us businesses looking to deliberately form a multi-cloud strategy must first ensure that their standards of digital hygiene are fit for...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive