intelligent
security intelligence that transcends borders
issue 27
33
36
44
33. predictive intelligence
Middle East telecom giant scales out
security for massive 5G-rollout with A10
Networks Thunder CFW
36. feature
Recovering data and operations
post-cyberattack
41. expert opinion
Is your cybersecurity ready for a return
to the office? Tamer Odeh, Regional
Director at SentinelOne ME
44. industry unlocked
Manufacturing: How the industry can
improve its security posture
55. intelligent technologies
74
62. business surveillance
Brunel University London steering a new
cyber path and investing early
48
48. feature
Threat hunting is the
acknowledgement that no system
can be considered 100% secure.
Matt Gangwer, Senior Director,
Managed Threat Response,
Sophos, and Greg Iddon, Senior
Product Marketing Manager,
Managed Threat Response,
Sophos, offer their advice on how
to approach threat hunting for
your business.
67. decrypting myths
Global security leaders outline four key
trends for how to transform a SOC
71. go phish
Richard McLoughlin, CEO and
Co-founder, Nowcomm
74. end-point analysis
Solving the cloud security conundrum
4 Issue 27 | www.intelligentciso.com