Your cyber intelligence source

The Secret CISO: “No one ever got sacked for buying IBM” – and that hurts

The Secret CISO: “No one ever got sacked for buying IBM” – and that hurts

Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious… 

The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor

Do CTOs and CISOs in larger companies prefer to buy technology only from the big vendor brands? Are these large companies truly innovative? Or is the factory of ideas really coming from mid-range and smaller startups with a different dynamic?

I don’t want to bash the big players. But I do believe there is scope in our sector for more open-mindedness towards the evaluation, acceptance and purchasing of innovative cybersecurity.

Upcoming Events


SC Bytesize

For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.

Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.