Magazine Button

Enterprise Security

Proofpoint and Okta protect users most targeted by cyberattacks

Organisations continue to struggle with advanced attacks that are focused on targeting their individual users. Proofpoint has taken a people-centric approach to looking at how threat actors carry out their attacks. This allows the company to provide customers with visibility into the most attacked users within your organisation. Based on various attack criteria – such […]


SureCloud helps Virtual Cabinet to enhance security

Virtual Cabinet is a secure document management software and client portal system. For 20 years, it has offered businesses a convenient and secure means of sharing documents with their clients, with in-built electronic signature capabilities. This speeds up business processes and automates core workflows, enabling greater collaboration and productivity. Virtual Cabinet now has around half […]


ThreatQuotient expert makes cyber predictions for 2020

Ryan Trost, Co-founder and CTO, ThreatQuotient, makes his predictions for the cybersecurity landscape in 2020. He says: “I predict 2020 will see at least one high-value OT network get infiltrated and held for ransom.”   As the 2020 budget meetings come and go – teams are forced to assess their current defences by analysing their […]


Venafi reveals research on security controls for human and machine identities

Venafi, a leading provider of machine identity protection, has announced the results of a study comparing security controls for human and machine identities. The study evaluated responses from over 1,500 IT security professionals from the US, UK, France, Germany and Australia across a range of company sizes and industries. People rely on usernames and passwords […]


A cloud built on integrated security

With the cloud services market expected to grow at a rate of 28% over the next five years to top R23 billion by 2023, Ralph Berndt, Director – Sales and Marketing at Syrex, says that South African companies have finally woken up to its potential. Research shows that cloud services have steadily been gaining momentum […]


Tristar implements Darktrace solutions to detect and respond to cyberthreats

Dubai-based logisticscompanyTristar Transport is defending its critical systems against advanced attacks with AI security solutions from Darktrace. “I sleep a little easier at night knowing that if there was a threat emerging it would be spotted before it was too late,” says Yassim Elfassi, the new Group Chief Information Officer at Tristar Group. Operating in […]


Check Point Research discovers ‘WhatsApp crash’ bug that works by malicious group message

Check Point Research, the threat intelligence arm of Check Point, has revealed it helped mitigate a new vulnerability in WhatsApp that could allow a threat actor to deliver a malicious group chat message that would crash the app for all members of the group. To regain use of WhatsApp, users would need to uninstall and reinstall it, […]


Kaspersky partners with jewellery designer to protect unique human biometrics in the digital world

Kaspersky has partnered with 3D accessory designer Benjamin Waye and creative agency Archetype to create a unique jewellery piece – a special ring that has a printed artificial fingerprint pattern that can be used for authentication.  The ring is just one of the possible solutions for protecting people’s biometric data in an environment where there isn’t […]


The KnowBe4 African Cybersecurity Awareness Report

Anna Collard, the Managing Director of KnowBe4 Africa, a specialist in cybersecurity awareness training, was in Mauritius to present The 2019 KnowBe4 African Cybersecurity Awareness Report with over 800 respondents across eight countries in Africa: South Africa, Kenya, Nigeria, Ghana, Egypt, Morocco, Mauritius and Botswana. The survey revealed the pressing need to educate Africans to the […]


SANS expert on getting the best value out of security assessments

Assessments such as vulnerability scanning and penetration testing help organisations to find gaps in their defences. But careful consideration must be given ahead of rolling these out. Bojan Zdrnja, SANS Certified Instructor and CTO at INFIGO IS, talks us through the various assessments and how they complement one another. There are many aspects to managing […]


Browse our latest issue

Intelligent CISO

View Magazine Archive