Magazine Button

Blogs

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus, Regional Director, Northern, Southern Europe, Middle East and Africa, Centrify. The recent Intersec 2019 held in Dubai had an interesting participant – an American company […]


Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of Service (DDoS) attacks. Darren Anstee, Chief Technology Officer, NETSCOUT Arbor, says certain advances in encryption technology, including the latest version of the […]


How quickly could a cyberattack take down critical infrastructure?

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, Doros Hadjizenonos, Regional Sales Director at security specialist Fortinet, says stakeholders need to consider the impacts of unseen risks, such as cyberattacks, on Operational Technology networks. The recent national infrastructure challenges have thrown into sharp relief the impacts down time can have […]


Exploring the role of cybersecurity in enterprise risk management

Anna Mazzone, MD and GM of UK and Ireland at MetricStream, discusses the role of cybersecurity in enterprise risk management. The importance of cybersecurity has never been so acute with data breaches and cyberincidents regularly making headlines. The fallout from cyberattacks can be far-reaching and long-lasting, and no organisation is safe. The impact can include […]


The effect of innovative technology on investigations industry

Thirty years ago, South Africa’s professional landscape looked completely different to what it is today. The investigations industry has been revolutionised by the advent of auditing firms which conduct internal investigations, and innovative technology that both simplifies and complicates the sector. Today, the private investigations and risk management sectors are led by businesses that have […]


Forcepoint expert on resolving disruptions in the financial industry

Gregg Brans, from Forcepoint SA, looks as how to resolve potential disruptions in the financial industry.  In the current digital era, customers regularly share their personal information with organisations and as a result, expect companies to safeguard their personal data as prime priority. This has never been more apparent than with financial institutions, as customers […]


Security spend and priorities – is your business getting it right?

Bernice Binet, F5 Brand Executive at South African based IT service management company EOH, analyses why organisations spend 90% of their security budget securing the perimeter of their systems when 77% of cyberattacks happen through apps.  Organisations locally and abroad do seem to be taking cybersecurity a lot more seriously. This is especially true in […]


Old IoT vulnerabilities: A botnet gift that ‘keeps on giving’

Bryan Hamman, Territory Manager for Sub-Saharan Africa at NETSCOUT Arbor, warns that it’s not only obvious IoT devices like fitness wearables and watches that are at risk; so are commonly overlooked devices like IP cameras and cable modems. Here tells us more here… New research from Arbor’s Security Engineering and Response Team (ASERT) reveals that while […]


Fortinet SA expert looks at the financial cybercrime trends for 2019

Doros Hadjizenonos, Regional Sales Director for Fortinet in South Africa, looks at the cybercrime trends in the financial services industry. The same concept holds true for cybercrime and the financial services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events […]


IDC expert on how to prevent the rise in cryptocurrency mining attacks

By Kieran Frost, Research Manager, IDC South Africa Cryptomining attacks (commonly known as ‘cryptojacking’) are the among the most prevalent threats organisations currently face, by 8,500% in 2017 according to Symantec. Cryptojacking is when a device is unwittingly used to mine cryptocurrency – depositing the currency into a wallet designated by the threat actor. Often […]


Browse our latest issue

Intelligent CISO

View Magazine Archive