Magazine Button

Blogs

Subex expert on the cyberthreats facing manufacturers

Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s critical that CIOs take steps to secure their critical infrastructure. Vinod Kumar, CEO, Subex, tells us about the challenges facing manufacturing firms and how they can get ahead of attackers. Can you tell us about some […]


Fearless innovation: Powered by hackers

Russell Coleman, Co-ordinated Disclosure Advisor at HackerOne, explains how ethical hacking can help organisations improve their cybersecurity. You may have an image in your head of what a hacker is. Pop culture and some fearmongering security vendor marketing still depicts them as hooded social outcasts, maybe driven by greed or a need to make trouble […]


The Domain Game: How email attackers are buying their way into inboxes

Cybercriminals are taking advantage of the current climate, targeting remote workers via email in a bid to obtain the ‘keys to the kingdom’. Dan Fein, Director of Email Security Products, Darktrace, tells us why organisations must take a new approach to email security to tilt the scales in favour of the defenders. It is by […]


Making a case for OT cybersecurity investment: How to present to the board

Operational Technology (OT) is at a growing risk of cyberattack, bringing with it the danger of far-reaching and costly impacts. But OT in most traditional heavy industries and infrastructure facilities have been run in silos behind ‘air gaps’ for so long that the Board assumes they are safe from attack. “Traditional approaches are no longer […]


How can vendors and end-users get the best out of their partnerships?

One of the challenges that modern CISOs face is knowing where to channel investment. And given that are many vendors, often offering similar services, choosing a provider or product can be difficult. A good vendor-end-user relationship based on trust and long-term partnerships is crucial. We asked three industry experts how vendors and end-users can get […]


Stand to lose everything through lack of awareness

There are a growing number of attacks and almost all of the successful ones have come from an insider being compromised through deception, negligence or a lack of awareness. J2 Software CEO John McLoughin says companies need to attack or face being attacked themselves and stand to lose everything. The common response to a cyberattack […]


Tackling the trillion dollar identity fraud crises

Online identity theft syndicates are dealt a significant blow as proven remote digital identity technology platform goes mainstream. Fraud costs trillions of dollars to world economies annually and, for consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma. Worldwide, around 40% […]


Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many organisations are adopting this type of technology. Have you ever done a Google search on yourself? Most people have and if your friends and family […]


Altron Karabina expert on how to prevent cloud application attacks

Sebastiaan Rothman, Senior Consultant Applications and Infrastructure at Altron Karabina, looks at what organisations can do to prevent cloud application attacks. Broadly speaking, cloud-based applications typically consist of one or more of the following platforms: web and mobile application services; storage; and databases. Each of these platforms have their own unique challenges when it comes […]


Successfully managing risk in today’s digital environment

Business agility has become a critical enabler in today’s digital environment, and yet outages can take it away with one snap of the fingers. Kate Mollett, Regional Manager for Africa at Veeam, looks at what you can do to ensure you have an effective disaster recovery plan in place.   In an age governed by […]


Browse our latest issue

Magazine Cover

View Magazine Archive