Magazine
NEWS
GOVERNANCE
STARTUPS
BUDGET
WORKFORCE
PARTNERSHIPS
THREATS
DATA PRIVACY
Regulations & Compliance
FEATURES
PODCASTS
Get Featured
INTERVIEWS
WHITEPAPERS
INFOGRAPHICS
MARKET TRENDS REPORT
DATA SECURITY
ENDPOINT SECURITY
CYBERSECURITY HIRING
DIGITAL FORENSICS
INNOVATOR’S CORNER
HOTSPOT
SPECIAL FEATURES
Videos
VIDEO INTERVIEWS
EVENT VIDEOS
WEEKLY NEWS
WEBINARS
EVENTS
Upcoming Events
Endorsed Events
E-Events
Masterclass
Advertise With Us
Search
Friday, April 16, 2021
About us
Advisory Board
Careers
Write for CISO MAG
Editorial Calendar 2021
Login
Subscribe Now
Subscribe Now
Added to cart
CISO MAG | Cyber Security Magazine
Magazine
NEWS
GOVERNANCE
STARTUPS
BUDGET
WORKFORCE
PARTNERSHIPS
THREATS
DATA PRIVACY
Regulations & Compliance
FEATURES
API Risks: What Are They and How to Manage Them
COVID-19 and the Current Cyberthreat Landscape in India
Identity Management Day: Here’s What Experts Have to Say
Why Businesses are Investing in Data Privacy
Hackers Have an Appetite for Indian Power Companies
PODCASTS
Get Featured
INTERVIEWS
WHITEPAPERS
INFOGRAPHICS
MARKET TRENDS REPORT
DATA SECURITY
ENDPOINT SECURITY
CYBERSECURITY HIRING
DIGITAL FORENSICS
INNOVATOR’S CORNER
HOTSPOT
SPECIAL FEATURES
Videos
VIDEO INTERVIEWS
EVENT VIDEOS
WEEKLY NEWS
WEBINARS
EVENTS
Upcoming Events
Endorsed Events
E-Events
Masterclass
Advertise With Us
Advertorial
BUDGET
DATA PRIVACY
EXCLUSIVE
Features
Governance
Hotspot
Infographics
Infosec Superwomen
Innovator’s corner
Interviews
NATIONAL CYBERSECURITY AWARENESS MONTH
News
Partnerships
Podcasts
REGULATIONS & COMPLIANCE
Startups
Threats
Video Interviews
Webinars
Weekly News
Whitepapers
Women in Cybersecurity
Workforce
Latest
Latest
Featured posts
Most popular
7 days popular
By review score
Random
“Security leaders must communicate consistently and with transparency to build trust”
CISOMAG
-
April 13, 2021
0
“Application Security is not a process”
CISOMAG
-
April 6, 2021
0
Interviews
Home
Interviews
Read our exclusive interviews with industry leaders, CISOs, CIOs, and CTOs on topics ranging from combating DDoS attacks, Identity and Access Management, Next-generation Firewalls, the future of workspace, and more
Interviews
“CISO is key to inspiring a change of heart around security”
CISOMAG
-
October 29, 2019
0
Interviews
“Invest in Employee Education rather than buying Protective Software and Hardware”
CISOMAG
-
October 16, 2019
0
Interviews
“Women should be actively safeguarding healthcare systems”
CISOMAG
-
October 3, 2019
0
Interviews
“Automation can help us by making sure our recovery environment replicates...
CISOMAG
-
September 2, 2019
0
Interviews
“Build your processes around the ability to stay agile”
CISOMAG
-
August 16, 2019
0
Interviews
“Identity-based protection is the future of cybersecurity strategy”
CISOMAG
-
May 30, 2019
0
Interviews
“As a CISO, most important is to leave your ego at...
CISOMAG
-
May 14, 2019
0
Interviews
“I believe I am here because I did not fear being...
CISOMAG
-
May 9, 2019
0
Interviews
Infosec Superwoman: Barbara Endicott-Popovsky
CISOMAG
-
April 17, 2019
0
Interviews
“Access to personal data by the state poses an enormous threat...
CISOMAG
-
February 26, 2019
0
1
...
5
6
7
...
9
Page 6 of 9
Edit with Live CSS