Magazine Button

Blogs

Making a case for OT cybersecurity investment: How to present to the board

Operational Technology (OT) is at a growing risk of cyberattack, bringing with it the danger of far-reaching and costly impacts. But OT in most traditional heavy industries and infrastructure facilities have been run in silos behind ‘air gaps’ for so long that the Board assumes they are safe from attack. “Traditional approaches are no longer […]


How can vendors and end-users get the best out of their partnerships?

One of the challenges that modern CISOs face is knowing where to channel investment. And given that are many vendors, often offering similar services, choosing a provider or product can be difficult. A good vendor-end-user relationship based on trust and long-term partnerships is crucial. We asked three industry experts how vendors and end-users can get […]


Stand to lose everything through lack of awareness

There are a growing number of attacks and almost all of the successful ones have come from an insider being compromised through deception, negligence or a lack of awareness. J2 Software CEO John McLoughin says companies need to attack or face being attacked themselves and stand to lose everything. The common response to a cyberattack […]


Tackling the trillion dollar identity fraud crises

Online identity theft syndicates are dealt a significant blow as proven remote digital identity technology platform goes mainstream. Fraud costs trillions of dollars to world economies annually and, for consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma. Worldwide, around 40% […]


Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many organisations are adopting this type of technology. Have you ever done a Google search on yourself? Most people have and if your friends and family […]


Altron Karabina expert on how to prevent cloud application attacks

Sebastiaan Rothman, Senior Consultant Applications and Infrastructure at Altron Karabina, looks at what organisations can do to prevent cloud application attacks. Broadly speaking, cloud-based applications typically consist of one or more of the following platforms: web and mobile application services; storage; and databases. Each of these platforms have their own unique challenges when it comes […]


Successfully managing risk in today’s digital environment

Business agility has become a critical enabler in today’s digital environment, and yet outages can take it away with one snap of the fingers. Kate Mollett, Regional Manager for Africa at Veeam, looks at what you can do to ensure you have an effective disaster recovery plan in place.   In an age governed by […]


Why network breaches are making CIOs/CISOs positions more challenging

CIOs and CISOs across industries are regularly moving between positions and companies because of network breaches. Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company, tells us how to avoid this. It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its operations. Millions in revenue is […]


Next-gen access control tech offers hospitality critical holistic view

With its high customer volume, the cash-and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment.  The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry. That is why it […]


Afiswitch MD says biometrics is the future of healthcare

Pine Pienaar, Managing Director at Afiswitch, looks at how biometrics is being used in the healthcare profession. The idea of using biometrics in the healthcare sector is not new, but it is one that hasn’t been explored or exploited to its full potential. A biometrics-based project was first piloted by health workers in three South […]


Browse our latest issue

Magazine Cover

View Magazine Archive