Magazine Button

Analysis

Near 33 million cyberthreats target users and organisations combined in Kenya

The increase in cyberthreats recorded by Kaspersky (Kaspersky.co.za) in the first half of this year in Kenya amounted to 32.8 million. Compared to similarly prominently targeted countries in the African region the recorded number was on par with South Africa accounting for 31.5 million and near double the number recorded in Nigeria at 16.7 million. […]


Study uncovers trends in breaches, supply chain loopholes and security confidence

Checkmarx, a global leader in developer-centric application security testing (AST) solutions, has unveiled the findings of its new global report, AppSec: The View from Security and Software Development Experts. The report was commissioned by Checkmarx and developed with Censuswide to spotlight the biggest security challenges that application security (AppSec) managers and software developers are facing […]


Hybrid working works best with Zero Trust and zero friction

Joseph Carson, Chief Security Scientist, ThycoticCentrify, explains how a Zero Trust approach can reduce risk without increasing friction for users. Last year we added a new phrase to our vocabulary, ‘working from home’ or WFH. This year, we added another term, ‘hybrid working’, to describe a flexible approach that combines working from home and the […]


McAfee Enterprise and FireEye predict top 2022 cyberthreats

McAfee Enterprise and FireEye have released its 2022 Threat Predictions, examining the top cybersecurity threats they predict enterprises will face in 2022. Bad actors have taken note of successful tactics from 2021, including those making headlines tied to ransomware, nation states, social media and the shifting reliance on a remote workforce. McAfee Enterprise and FireEye […]


Revisit the fundamental element of secured banking: Know your breach likelihood

Saket Modi, Co-Founder and CEO at Safe Security, describes how cybersecurity in the banking sector has now come into sharp focus. He says: “However, the fundamentals of how cybersecurity is approached are still unclear, which is why we still see businesses spend on the bottomless well and still get breached.” Can I jump over two […]


Go Phish: Mark Belgrove, Head of Cyber Consultancy, Exponential-e

We ‘go phishing’ with Mark Belgrove, Head of Cyber Consultancy, Exponential-e, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? Once when I was working for a large global company as its CISO, the business was hit by a ransomware attack. […]


Rapid7 expert on dismantling silos to connect technology, processes and people

Cloud adoption has revolutionised security operations for organisations but has also introduced new risks. Nasar Saddiq, Senior Regional Manager, Middle East & Africa, Rapid7 tells us how Rapid7 helps organisations address key challenges and why a cloud centric approach is important, as well as how organisations can best prepare and implement a strategy that protects […]


Biometrics – The next frontier in the cybersecurity fight

Businesses in the modern world must utilise security procedures like biometrics to stay ahead of the competition. Grahame Williams, Identity & Access Management Director at Thales, discusses how biometrics is being used to change the identity and access management game. The cyber world is a constant battle. As businesses look to innovate and progress, there […]


Go Phish: Martin Riley, Director of Managed Security Services, Bridewell Consulting

We ‘go phishing’ with Martin Riley, Director of Managed Security Services, Bridewell Consulting, who tells us about life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? For me, it’s playing a part in the growth of Bridewell’s managed security services over the last 12 months. […]


BlackBerry secures group phone calls and messages from high-risk eavesdropping

BlackBerry has announced its SecuSUITE for government offering now provides certified end-to-end encryption of all group phone calls and instant messages for governments and enterprises alike. The global pandemic has forced millions of employees into working from home. To avoid disruption, teams are turning to group calling methods to ensure Business Continuity, however most are […]


Browse our latest issue

Intelligent CISO

View Magazine Archive