Magazine Button

Feature

Identity management implications and how organisations can properly manage their identity

Venafi, inventor and a leading provider of machine identity management, has announced the findings of a global study of 1,000 CIOs, which shows that Digital Transformation is driving an average of 42% annual growth in the number of machine identities. Because CIOs often have limited visibility into the number of machine identities on their networks […]


How important is effective backup for ensuring data security?

Acronis, a global leader in cyber protection, has released its annual Cyber Protection Week Global Report 2022. The report which surveyed over 6,200 IT users and IT managers from small businesses to enterprises across 22 countries – including the United Arab Emirates (UAE) – exposes some of the most critical shortcomings appearing in cyber protection practices […]


Telefónica ramps up security capabilities for seamless operations

The telecommunications industry is one of the most targeted for cyberattacks and telco providers must therefore be on top of their game when it comes to security. Telefónica, one of the world’s leading telco companies, has developed innovative solutions – reliant upon 5G technology – to better manage security maintenance tasks and ensure the company […]


Trends expected to develop in the cybersecurity space in 2022

2021 has been a year of widespread uncertainty across the globe, especially for those in the cybersecurity space as cybercriminals ramped up their attack methods, particularly targeting the healthcare sector. CISOs, among many others, are hoping that 2022 will bring a year of certainty and growth and are predicting what the next 12 months will […]


Record number of cyber incidents mitigated as NCSC protects vaccine rollout

The COVID-19 pandemic has been a catalyst for an increased number of cyber incidents thrust upon the healthcare sector, which had to be managed quickly and efficiently to protect against the vaccine rollout. The NCSC’s 2021 Annual Review highlights the work undertaken to protect the UK over the past 12 months. The National Cyber Security Centre (NCSC) […]


Securing the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include PCs, laptops, smart phones, tablets and specialised equipment such as bar code readers or point of sale (PoS) terminals. Industry experts share insights on how […]


Fortinet reduces cyberskills gap with Training Advancement Agenda (TAA)

With the cyberskills gap still prevalent across the cybersecurity industry, organisations are attempting to tackle it in order to operate with a robust and responsive security model when it comes to defending against bad actors. Fortinet has revealed its Network Security Expert (NSE) Training Institute which creates a variety of opportunities through training, certifications and […]


Defining hybrid networks and how to secure them

IT teams have to deploy, manage and secure increasingly complex and hybrid networks. John Madisson, EVP of Products and CMO at Fortinet, explains five essential security functions for hybrid networks. Organisations have distributed data and workloads across both cloud environments and on-premises data centres. As a result, IT teams have to deploy, manage and secure increasingly complex and […]


The silver lining of security AI success stories

With changes in the IT landscape making the job of Security Operations Centre (SOC) teams harder than ever, Stephan Jou, Micro Focus Expert based in Canada, tells us there are tools like AI and anomaly detection that can be more than helpful to the SOC team. 2020 was quite a year. I am, of course, […]


Evolving network security market

In IT, network security is the act of maintaining the integrity of a computer network and the data within it. Network security is important because it keeps sensitive data safe from cyberattacks and ensures that the network is usable and can be trusted. Industry pundits share with Intelligent CIO Africa, several methods for enforcing security, […]


Browse our latest issue

Intelligent CISO

View Magazine Archive