Magazine Button

Blogs

Stand to lose everything through lack of awareness

There are a growing number of attacks and almost all of the successful ones have come from an insider being compromised through deception, negligence or a lack of awareness. J2 Software CEO John McLoughin says companies need to attack or face being attacked themselves and stand to lose everything. The common response to a cyberattack […]


Tackling the trillion dollar identity fraud crises

Online identity theft syndicates are dealt a significant blow as proven remote digital identity technology platform goes mainstream. Fraud costs trillions of dollars to world economies annually and, for consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma. Worldwide, around 40% […]


Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many organisations are adopting this type of technology. Have you ever done a Google search on yourself? Most people have and if your friends and family […]


Altron Karabina expert on how to prevent cloud application attacks

Sebastiaan Rothman, Senior Consultant Applications and Infrastructure at Altron Karabina, looks at what organisations can do to prevent cloud application attacks. Broadly speaking, cloud-based applications typically consist of one or more of the following platforms: web and mobile application services; storage; and databases. Each of these platforms have their own unique challenges when it comes […]


Successfully managing risk in today’s digital environment

Business agility has become a critical enabler in today’s digital environment, and yet outages can take it away with one snap of the fingers. Kate Mollett, Regional Manager for Africa at Veeam, looks at what you can do to ensure you have an effective disaster recovery plan in place.   In an age governed by […]


Why network breaches are making CIOs/CISOs positions more challenging

CIOs and CISOs across industries are regularly moving between positions and companies because of network breaches. Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company, tells us how to avoid this. It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its operations. Millions in revenue is […]


Next-gen access control tech offers hospitality critical holistic view

With its high customer volume, the cash-and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment.  The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry. That is why it […]


Afiswitch MD says biometrics is the future of healthcare

Pine Pienaar, Managing Director at Afiswitch, looks at how biometrics is being used in the healthcare profession. The idea of using biometrics in the healthcare sector is not new, but it is one that hasn’t been explored or exploited to its full potential. A biometrics-based project was first piloted by health workers in three South […]


Redstor says World Backup Day was a reminder to liberate your backup

Redstor, a global data management SaaS specialist, says there was a good reason why World Backup Day was on March 31 – to emphasise that, if you don’t get it right on that date, you risk being made to look a fool when the time comes to recover data on April 1. “Monitoring and managing […]


Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit activities that can infringe on an individual’s human rights. Therefore, leading experts say further consideration must be given to the protection of human rights to incorporate far […]


Browse our latest issue

Magazine Cover

View Magazine Archive