Magazine Button

Blogs

Next-gen access control tech offers hospitality critical holistic view

With its high customer volume, the cash-and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment.  The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry. That is why it […]


Afiswitch MD says biometrics is the future of healthcare

Pine Pienaar, Managing Director at Afiswitch, looks at how biometrics is being used in the healthcare profession. The idea of using biometrics in the healthcare sector is not new, but it is one that hasn’t been explored or exploited to its full potential. A biometrics-based project was first piloted by health workers in three South […]


Redstor says World Backup Day was a reminder to liberate your backup

Redstor, a global data management SaaS specialist, says there was a good reason why World Backup Day was on March 31 – to emphasise that, if you don’t get it right on that date, you risk being made to look a fool when the time comes to recover data on April 1. “Monitoring and managing […]


Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit activities that can infringe on an individual’s human rights. Therefore, leading experts say further consideration must be given to the protection of human rights to incorporate far […]


Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business sector. And as Mikey Molfessis, cybersecurity expert at Mimecast South Africa explains, as we hurtle into the Fourth Industrial Revolution, access to cloud […]


Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand cash and simply disappear. These days, a criminal doesn’t even have to be in the same country as the […]


Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus, Regional Director, Northern, Southern Europe, Middle East and Africa, Centrify. The recent Intersec 2019 held in Dubai had an interesting participant – an American company […]


Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of Service (DDoS) attacks. Darren Anstee, Chief Technology Officer, NETSCOUT Arbor, says certain advances in encryption technology, including the latest version of the […]


How quickly could a cyberattack take down critical infrastructure?

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, Doros Hadjizenonos, Regional Sales Director at security specialist Fortinet, says stakeholders need to consider the impacts of unseen risks, such as cyberattacks, on Operational Technology networks. The recent national infrastructure challenges have thrown into sharp relief the impacts down time can have […]


Exploring the role of cybersecurity in enterprise risk management

Anna Mazzone, MD and GM of UK and Ireland at MetricStream, discusses the role of cybersecurity in enterprise risk management. The importance of cybersecurity has never been so acute with data breaches and cyberincidents regularly making headlines. The fallout from cyberattacks can be far-reaching and long-lasting, and no organisation is safe. The impact can include […]


Browse our latest issue

Intelligent CISO

View Magazine Archive