Magazine Button

Blogs

Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many organisations are adopting this type of technology. Have you ever done a Google search on yourself? Most people have and if your friends and family […]


Altron Karabina expert on how to prevent cloud application attacks

Sebastiaan Rothman, Senior Consultant Applications and Infrastructure at Altron Karabina, looks at what organisations can do to prevent cloud application attacks. Broadly speaking, cloud-based applications typically consist of one or more of the following platforms: web and mobile application services; storage; and databases. Each of these platforms have their own unique challenges when it comes […]


Successfully managing risk in today’s digital environment

Business agility has become a critical enabler in today’s digital environment, and yet outages can take it away with one snap of the fingers. Kate Mollett, Regional Manager for Africa at Veeam, looks at what you can do to ensure you have an effective disaster recovery plan in place.   In an age governed by […]


Why network breaches are making CIOs/CISOs positions more challenging

CIOs and CISOs across industries are regularly moving between positions and companies because of network breaches. Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company, tells us how to avoid this. It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its operations. Millions in revenue is […]


Next-gen access control tech offers hospitality critical holistic view

With its high customer volume, the cash-and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment.  The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry. That is why it […]


Afiswitch MD says biometrics is the future of healthcare

Pine Pienaar, Managing Director at Afiswitch, looks at how biometrics is being used in the healthcare profession. The idea of using biometrics in the healthcare sector is not new, but it is one that hasn’t been explored or exploited to its full potential. A biometrics-based project was first piloted by health workers in three South […]


Redstor says World Backup Day was a reminder to liberate your backup

Redstor, a global data management SaaS specialist, says there was a good reason why World Backup Day was on March 31 – to emphasise that, if you don’t get it right on that date, you risk being made to look a fool when the time comes to recover data on April 1. “Monitoring and managing […]


Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit activities that can infringe on an individual’s human rights. Therefore, leading experts say further consideration must be given to the protection of human rights to incorporate far […]


Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business sector. And as Mikey Molfessis, cybersecurity expert at Mimecast South Africa explains, as we hurtle into the Fourth Industrial Revolution, access to cloud […]


Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand cash and simply disappear. These days, a criminal doesn’t even have to be in the same country as the […]


Browse our latest issue

Intelligent CISO

View Magazine Archive