Magazine Button

Blogs

Are physical security features still needed on identity documents?

By Vincent Gourmelen, ID Card Solutions Product Manager, Citizen Identity Solutions at HID Global At a time of strong data encryption, on-chip biometry checks, digital signatures or national public key directories (N-PKD), one can question the necessity of adding advanced physical security features on a passport or an identity card. Counterfeited IDs are a concern […]


Expert opinion: closing the cybersecurity generation gap

Nick Lowe, Regional Director, Northern Europe at Check Point shows why conventional enterprise security defences cannot cope with the latest generation of cyber-attacks, and how those defences must evolve Over the past 30 years, both cyberattacks and security protections have rapidly evolved. Looking back, it’s easy to identify successive generations of attacks and security solutions. […]


Fortinet expert on how to successfully raise a tech business

Michael Xie, Founder, President and CTO of cybersecurity firm Fortinet shares some pointers on how to raise a tech business successfully. As many teenagers can attest to, growing up isn’t easy. In my experience, neither is nurturing a tech business. As firms that find success as start-ups develop into mid-sized and eventually large companies, they […]


AppCentrix expert on importance of safeguarding your data

What procedures should companies have in place to safeguard their data? By Omar Sati, Executive Board Member at AppCentrix International When thinking about their data, organisations primarily concern themselves with data management and processing, but the scope extends well beyond this and should now include specific requirements such as data security and transparency. Especially considering […]


Rethinking data security with a risk adaptive approach

Christo van Staden, Forcepoint Regional Manager for Sub-Saharan Africa, says the two megatrends of cloud-based applications and mobile devices have been a boon for company productivity, agility, and innovation. The mobile-cloud combo empowers employees to work and be productive literally anywhere. However, the mobile-cloud era has created a conundrum for cybersecurity teams. If we look […]


High cost of cybercrime in Africa cause for concern

Ken Munyi, Country Manager at IWayAfrica Kenya, says African businesses need to take more decisive steps to prioritise data protection and enhance enterprise security in order to mitigate the high cost of cyberattacks. The millions of cyberattacks that take place every year across the continent are cause for concern, particularly for Africa’s larger economies such […]


BeyondTrust expert on how to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices for incident response. The methodologies vary greatly based on the sensitivity of the data and requirements to notify law […]


Biometric advancement predictions for 2018

Article by: Tom Harwood, Chief Product Officer and Co-Founder at Aeriandi “As it stands, it is estimated that between 30 percent to 50 percent of all fraud incidents are initiated with a phone call, meaning telephone agents in contact centres are particularly vulnerable to social engineering and manipulation. Web-based security measures have evolved much faster […]


ANSecurity’s technical director warns of potential security breaches

Criminal services expand As predictable as day follows night, 2018 will see more high profile breaches impact large and well-known companies. What will be less visible to the public will be the activities of Crime-as-a-Service (CaaS) which will expand, allowing more focused criminals to rent resource for ransomware campaigns that may never be exposed to […]


Biometric security predictions for 2018

Can biometrics replace any existing authentication technology today? Yes, biometrics can replace existing authentication technology today but there is a lot of work to be done and additional security layers are needed to be commercially viable. For example, I do not regard FaceIT from Apple as secure due to twins and printed masks that have […]


Browse our latest issue

Intelligent CISO

View Magazine Archive