Featured

IT and OT security with Ilan Barda, CEO of Radiflow

Cyber Magazine speaks with Radiflow’s CEO, Ilan Barda, about converging IT and OT and how leaders can better protect businesses from cybersecurity threats

Secure 2024: AI’s impact on cybersecurity with Integrity360

With 2023 seeing increased AI in cybersecurity, and rising cyberattacks, Integrity360 leaders consider what the 2024 cyber landscape will look like

Technology & AI

The strategic importance of good cyber hygiene

Cyber threats are a major concern for businesses of all sizes, which is why good cyber hygiene is imperative to safeguarding enterprises in the digital era

Cyber Security

MOVEit cyberattack anxieties: Turning ransomware into action

In the wake of such a high profile cyberattack, a Veeam study highlights its impact as more business leaders invest in cyber protection solutions

Operational Security

Cybercriminals to use fraudulent websites for scams

Cyber Security

Cyber threats as a paramount concern for data centres

Cyber Security

Interviews

View all
Featured

Jad Elsohemy

VP of Technology & Innovation at OEC

Jad Elsohemy, VP of Technology & Innovation at OEC, discusses the importance of effective cybersecurity governance when protecting critical infrastructure

Read More

Krista Griggs

Head of Banking, Financial Services and Insurance Sector for Fujitsu UK

Fujitsu’s Krista Griggs talks breaking down barriers to fintech adoption for clients, and her success in growing Fujitsu’s financial services business

Read More
“Fujitsu has the expertise in all those deep pockets to help with the complex integration of fintech systems at banks and other financial organisations”
Krista Griggs
Head of Banking, Financial Services and Insurance Sector for Fujitsu UK

Interview with Andersen Cheng

CEO at Post-Quantum

We speak with Andersen Cheng, CEO at Post-Quantum, on the steps organisations should be taking to prepare for a post-quantum world

Read More

Noga Sharabani

Director of Global Procurement at Claroty

Noga Sharabani, Director of Global Procurement at Claroty, explains why procurement needs to be a strong voice in any business

Read More

Ashley Lorraway

Director of Security Infrastructure, Research and Development at Okada Manila

While most people his age went into mining or agriculture, Ashley Lorraway chose to pursue a different path thanks to his family’s unrelenting ambition

Read More

Jad Elsohemy

VP of Technology & Innovation at OEC

Jad Elsohemy, VP of Technology & Innovation at OEC, discusses the importance of effective cybersecurity governance when protecting critical infrastructure

Read More

Top 10

View all

Top 10 CISOs in APAC

Cyber Magazine considers some of the leading CISOs across APAC who are committed to ensuring their respective companies have robust security strategies

Top 10 CISOs in North America

Cyber Magazine considers some of the leading Chief Information Security Officers (CISOs) who are committed to protecting sensitive business data

Top 10 CISOs in EMEA

Cyber Security

Top 10 Chief Information Security Officers

Cyber Security

Cyber Security

View all

SL Crimewall: A revolutionary OSINT investigation platform

With its release of standalone OSINT investigation platform SL Crimewall open-source intelligence company Social Links is redefining the intelligence cycle

SL Crimewall: A revolutionary OSINT investigation platform

Protecting the energy sector using proactive intelligence

A new era of cybersecurity threats in the digital landscape

The rapidly evolving threat landscape of 2024

Navigating the ever-evolving cybersecurity landscape

Network Security

View all

Cyber technology risks key concern for businesses, says PwC

PwC's risk survey reveals that, despite new AI technologies being viewed as positive, cyber and digital technology remain top concerns for businesses

Cyber technology risks key concern for businesses, says PwC

Zero Trust Segmentation with Illumio’s Raghu Nandakumara

WithSecure finds new ransomware groups cause attack surge

Is the password dead? Legacy technology prevents the shift

Fake Bard AI malware: Google seeks to uncover cybercriminals

Videos

View all
Featured

Exclusive Tech Mahindra & Microsoft Cybersecurity Roundtable

Tech Mahindra and Microsoft have joined forces to organise a groundbreaking cybersecurity roundtable in Texas.

Cyber Security

Procurement at Claroty at the forefront of business success

Cyber Security

Fujitsu: Leading digital transformation in fintech

Cyber Security

Regaining control over SaaS usage with Wing Security

Application Security

View all

QR ‘Quishing’ scams: Do you know the risks?

QR code scams, or Quishing scams, are rising and pose a threat to both private users and businesses as cyberattacks move towards mobile devices

Could passkeys be the start of a passwordless future?

ISACA: IT workers “worry” about AI being exploited

OT Security

View all

CrowdStrike Falcon Go aims to revolutionise cyber protection

The cybersecurity leader unveils its new AI-powered cybersecurity protection for businesses to facilitate better ransomware prevention and data protection

CrowdStrike Falcon Go aims to revolutionise cyber protection

Major Samsung data breach exposes customer data

Cyber threats will continue to impact critical services

EU-Ukraine align cybersecurity policies enhancing resilience

Will Grinch bots steal Christmas with sophisticated attacks?

Events

View all

Sustainability LIVE Net Zero

Sustainability LIVE Net Zero with top C-level executives for exclusive keynotes, panels, workshops, and more, all driving the Net Zero mission

Register now

Cyber Security & Cloud Expo Global 2023

Strengthening the cyber security & cloud infrastructure

Register now

GISEC GLOBAL 2024

Participate at GISEC Global 2024 and join us to create a ground-breaking phenomenon inside the world of Cybersecurity.

Register now

Don’t Let Ransomware Catch You Unprepared – Take These Step

Don’t Let Ransomware Catch You Unprepared – Take These Steps Now Tue, Jun 7, 2022 · 3:00 PM

Register now

Cloud & Infrastructure

View all

Illumio: Nearly half of data breaches originate in the cloud

New research conducted by Illumio shows nearly half of all data breaches are originating in the cloud, costing organisations an average of US$4.1m

Illumio: Nearly half of data breaches originate in the cloud

Darktrace AI offers real-time cyber resilience for cloud

Cybercriminals are creating a darker side to AI

The rising tide of deepfakes as AI growth cause concern

Cyber leaders concerned that AI will outpace cyber defences

Tech & AI

View all

CyberArk Centre of Excellence improving security with gen AI

CyberArk has announced an AI Centre of Excellence with the mission to analyse the impact of generative AI on attacker innovation

Ontinue driving the next evolution of MDR with AI

The role of generative AI in tackling cyber threats