Magazine Button

More News

ServiceNow launches Trusted Security Circles

ServiceNow has announced Trusted Security Circles, a new cloud-based application that gives enterprises the ability to share and receive hyper-relevant threat intelligence in near real-time. Security teams have been fighting threats in isolation. Sharing information about threats would expose to the world that they were under attack. Now, security teams can ask trusted peers, suppliers […]


Fortinet launches global Threat Intelligence Service

Fortinet®, the global leader in high-performance cybersecurity solutions, has announced a new threat intelligence service that arms cybersecurity leaders with cyber situational awareness, highlighting the latest threat trends and cyber risks facing their organisations. Fortinet’s FortiGuard Threat Intelligence Service (TIS) enables CISOs to stay ahead of the global threat landscape and proactively defend their enterprises […]


Does Wi-Fi network compliance equal corporate data security?

If a network is compliant with regulations, does that mean it’s secure? Unfortunately for both IT professionals and businesses, it does not. “Compliance is not security, but security can be compliant – with a set of requirements and guidelines that ensure data is confidential to authorised users, has integrity, has not been changed or modified, […]


How advanced targeted attacks evolved in Q2, 2017

The months from April to end June witnessed significant developments in targeted attacks by, among others, Russian-, English-, Korean-, and Chinese-speaking threat actors. These developments have far-reaching implications for business IT security: sophisticated malicious activity is happening continuously almost everywhere in the world, increasing the risk of companies and non-commercial organisations becoming collateral damage in […]


Sophos announces Super Star campaign for Silver and Authorised partners in Africa

Sophos, a global leader in network and endpoint security, has announced a new initiative for its Authorised and Silver partners from the Middle East & Africa (MEA). The Sophos Super Star campaign is designed to motivate partners with additional rewards on achieving their target. It is also aimed at driving sales for the latest security […]


How backup can help businesses to never be held hostage by ransomware

Article by: Richard Agnew, VP NW EMEA at Veeam Software Paying ransom fees to regain access to data in the vague hope that criminals will release files from hostage is a known phenomenon that continues to demand regular column inches. But currently, with ransomware on the rise, no company wants to get into the habit […]


How enterprises should best approach privileged access password management

John Hathaway, Regional Sales Director, Middle East, BeyondTrust, tells us about the best ways to deal with Privileged Access Management Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications and more. But unfortunately, with so much power inherent in privileged […]


Enabling a secure digital transformation

Article by C R Srinivasan – Senior Vice President, Global Product Management & Data Centre Services at Tata Communications Organisations today are embarking on their own distinct journeys of digital transformation as advances in new technologies like 5G and AI change the face of business. There is a common misconception that security hinders innovation, and […]


Why data classification should drive your security strategy

There are two types of businesses in the world today; those that run on data and those that will run on data. As a result, data security now sits at the top of nearly every organisation’s priority list. But with such a high volume coming into most businesses every day, how can InfoSec professionals quickly […]


Intact launches MyCybercare Insurance to Africa and beyond

The common maxim today is that there are two kinds of companies: those who have been breached, and those who have been breached, but don’t know it yet. Either way, there is little doubt that cybercrime poses a major threat, and is a serious challenge to businesses of all types and sizes around the world. […]


Browse our latest issue

Intelligent CISO

View Magazine Archive