Magazine Button

Feature

Next-gen access control tech offers hospitality critical holistic view

With its high customer volume, the cash-and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment.  The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry. That is why it […]


Afiswitch MD says biometrics is the future of healthcare

Pine Pienaar, Managing Director at Afiswitch, looks at how biometrics is being used in the healthcare profession. The idea of using biometrics in the healthcare sector is not new, but it is one that hasn’t been explored or exploited to its full potential. A biometrics-based project was first piloted by health workers in three South […]


Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit activities that can infringe on an individual’s human rights. Therefore, leading experts say further consideration must be given to the protection of human rights to incorporate far […]


Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business sector. And as Mikey Molfessis, cybersecurity expert at Mimecast South Africa explains, as we hurtle into the Fourth Industrial Revolution, access to cloud […]


Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of Service (DDoS) attacks. Darren Anstee, Chief Technology Officer, NETSCOUT Arbor, says certain advances in encryption technology, including the latest version of the […]


There is more to cyber-risk than security, says thryve expert

Riaan Bekker, Force Solutions Manager at thryve, which provides risk and governance management technologies, says cyber-risk isn’t just about security; it has become a serious issue of business continuity and is the core responsibility of executives of businesses of any size to protect shareholder value. Risk experts hold no doubts. The changes technology is bringing […]


Experts advise on how to protect your business this Safer Internet Day

Safer Internet Day is celebrated every year as a way for schools to educate children on online safety. But it’s not a day that should be solely relevant for school children – it has a lot of relevance to businesses too. The 2018 Cyber Security Breaches Survey, conducted on behalf of the UK government, revealed […]


Critical steps in data protection to drive business success

Monday 28th January marks the 13th annual Data Protection Day, a day aimed at raising awareness and promoting good data privacy practices around the world. We hear from a number of experts who explain the steps to complying with data protection legalities. Spencer Young, RVP EMEA at Imperva: The past year saw vast changes impacting […]


Expert discusses cyber challenges for financial services organisations

It may seem impossible to combat cybersecurity risks when new products are being released into industry markets tenfold. We consider how financial services security teams can solve the basics of security. James Doggett, CISO, Panaseer, tells us why financial services organisations struggle to demonstrate strong control over their enterprise cyberhygiene, despite investing a fair amount […]


Taking steps to mitigate cyber-risks posed to CNI

As cyberattacks are ever evolving and becoming more advanced, it’s time for technology leaders to step up and ensure they have the right measures in place to maintain a robust cybersecurity programme for critical national infrastructure (CNI). We hear from Kim Legelis, CMO, Nozomi Networks, who explains the cyber-risks associated with CNI and advises on […]


Browse our latest issue

Intelligent CISO

View Magazine Archive