Magazine Button

More News

Xperien issues last warning to comply to PoPI Act

Xperien has warned delegates at the ITWeb PoPI Update II 2017 that it’s time to comply with the PoPI Act now that it has been signed by the President. It says the Information Regulator has published the regulations for comment and companies will only have one year from the commencement date to comply or face […]


Hitachi Vantara launches cloud-enabled data recovery solution

Hitachi Vantara, a wholly owned subsidiary of Hitachi, Ltd., has introduced the latest version of its specialised data recovery platform, Hitachi Data Instance Director (HDID) v6, which significantly modernises IT environments and how data is protected. This newest version improves data availability – a requirement for transforming an organisation into a modern digital enterprise – […]


Spectrum from Arbor gives you a detective inside your network

Advanced malware is no longer the most dangerous enemy in the world of advanced threats. Instead, the new enemy is the attack campaign – a series of hidden events engineered to create chaos. This is according to Arbor Network’s Territory Manager for sub-Saharan Africa, Bryan Hamman, who says, “The new enemy is human orientated. Traditionally, […]


Fake news ‘as a service’ on the rise according to Digital Shadows

Proliferation of fake news gets even easier via $7 toolkits and services advertised on the dark web, says Rick Holland of Digital Shadows New research indicates that criminals are increasingly exploiting the growth of ‘fake news’ for commercial gain. The growth of so-called fake news has traditionally been associated with the political sphere and executed […]


Prevention or cure? Focusing your cybersecurity efforts

An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organisation against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organised than ever. This past year has shown how vulnerable organisations of […]


Bad patch management keeps old exploits en vogue

As much as cybercriminals continue to refine and expand their ways of attacking data and devices, they are also digging into their bags of tried and trusted tricks. Richard Broeke, an IT security specialist and General Manager at leading managed IT security provider, Securicom, says that there’s a growing number of companies experiencing exploits on […]


DDoS mitigation is the best practice in an IoT world

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this brand-new world of science fiction coming to life, threats lurk also. So says Arbor Network’s […]


The shift from prevention technology to deception and response

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new technologies such as IoT changing the threat landscape. Q: Since the product launch in June this year, has Attivo made any adaptations to […]


Remotely protect and control your data with Seclore 3.0

Seclore is one of the pioneers in the EDRM (Enterprise Digital Rights Management) space. The company has recently launched their new product version, Seclore 3.0. Intelligent CIO caught up with Rohit Oberoi, Director Channel Sales – India, Middle East and Africa, to discuss the product launch and how Seclore is helping companies to secure collaboration […]


Threat actors could use third-party software to gain entry into enterprise

In the coming year, the world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and mitigate, according to Kaspersky Lab’s Targeted Threat Predictions for 2018. Other hard-to-block attacks, such as those involving high-end mobile malware are […]


Browse our latest issue

Intelligent CISO

View Magazine Archive