security intelligence that transcends borders
contents issue 52
Lynchpin Media and its publications look to maintain the highest standards in terms of quality of contents and images used . However , the current situation has led to some challenges with regards to photos and we apologise for any reduction in the quality of our products caused by this .
6 . news
Latest news round-up
15 . latest intelligence
Latest whitepapers from Alcatel-Lucent and Tanium
18 . cyber trends
Research reveals 40 % of companies believe their cyber strategy will be outdated in under two years
22 . infographic
57 % of organisations take weeks for infrastructure access to be approved
24 . threat updates
Latest updates from across the globe and the UK
27 . editor ’ s question
How can organisations improve their cloud security ?
33 . predictive intelligence
How to build a successful security awareness training programme
41 . expert opinion
How the modern CISO can counter the growing cybersecurity threat
44 . industry unlocked
The state of cybersecurity in retail : How best to defend
55 . intelligent technologies
James Tamblin , BlueVoyant UK President , outlines the importance of businesses having an incident response plan in place to respond to cyberattacks quickly and efficiently . He highlights the steps organisations should take to develop a reliable incident response plan .
48 . feature
Ensuring cybersecurity investments align with the business ’ goals is a key element of success , however , managing the two simultaneously can be extremely challenging . Kev Eley , Vice President Sales , Europe at LogRhythm , explores what the right amount of cybersecurity is in order to mitigate priority risks and offers his best practice advice for achieving a targeted security budget for growth .
Benjamin Corll , VP
62 . business surveillance of Cybersecurity at
Zero Trust , cloud and remote Coats , discusses the working drive digital resiliency organisation ’ s work with Zscaler which offered
67 . decrypting myths improved visibility and How organisations can effectively secured its Industry defend against ransomware
5.0 transformation . He
71 . go phish also explains why it ’ s
Matias Madou , Co-founder and important to empower
CTO of Secure Code Warrior your people , because
51 they ‘ are not your
74 . end point analysis weakest link , but your
Containing and securing shadow best sensors ’.
IT and technical debt cover story www . intelligentciso . com