How To

Pros and cons of outsourcing your organisation’s security events...

Any cyber security service is based on three core pillars of security operations which are people, process and technology. It is a known fact that Security Information and Event Management or SIEM is a complex...

How security vendors are moving away from using decision trees to deep...

The recent replacement of the decision-making tree with deep-learning neural networks to build tomorrow’s cyber security solutions, promises to be a significant differentiator amongst security vendors....

Can the cloud be used to boost artificial intelligence and security solutions

Organisations face a growing number of increasingly complex and ever-evolving threats – and the most dangerous threats are often the hardest to discover. Take the insider threat or stolen credentials, for example. We h...

Using integration middleware to unravel legacy applications and siloed data

Today, organisations are acutely aware of the need to become more digital in order to stay competitive and serve customers in new ways. We have entered an era of agile development practices, hybrid technology...

Relooking at CISO operational metrics using automated detection and response

CISOs have become leaders in their businesses rather than just experts in their departments. They need to educate their peers on the scope, scale, severity and solutions for cybersecurity and how emerging threats...

How IoT will make buildings intelligent by connecting systems to the Internet

The Internet of Things is getting a lot of attention these days. A reason is the size of the economic activity generated – as much as $11.1 trillion by 2025 in an analysis from the McKinsey Global Institute. According t...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive