Magazine Button

More News

The rise of Security as a Service in the evolving threat landscape

The constant evolution of the global security threat landscape is playing a part in the rise of Cybersecurity as a Service offerings. In addition, the evergreen discussion around cost modelling, namely the ‘capex vs opex’ issue, is also a factor in the promotion of this type of service, particularly when it comes to security approaches […]


Why we should let our walls down when it comes to security

By Ashish Gupta, Executive Vice President and Chief Marketing Officer at Infoblox which operates in the Middle East and Africa With digital threats growing more rampant across the world, the idea of building ‘walls’ for cyber defence and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the […]


Digital Shadows reports the pressing need for better digital risk management

Leading tech analyst group suggests businesses must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritising, and responding to threats across the public Internet and dark web Digital Shadows, an industry leader in digital risk management, has unveiled a new report called: ‘The Pressing Need for Digital Risk Management’ from top analysts […]


Enterprise Strategy Group reports ‘The Pressing Need for Digital Risk Management’

Digital Shadows, the industry leader in digital risk management, has unveiled a new report called: ‘The Pressing Need for Digital Risk Management’ from top analysts at the Enterprise Strategy Group (ESG) looking at the growing importance and rates of adoption of digital risk management in business today. The report recognises that most CEOs and corporate […]


Syrex harnesses Redstor to deliver seamless solutions

Syrex, provider of virtualised and hybrid network infrastructures and solutions, has implemented numerous Redstor offerings in the South African market, providing clients with enterprise-level cloud backup and security implementations. For Syrex, the Redstor portfolio is ideally suited to the local market with comprehensive security and capability alongside relevant and accessible management functionalities. “We have utilised […]


Three powerful tools in the fight against malware in South Africa

Over the years, South Africans have become accustomed to learning about massive hacks and data breaches from international news sources – considering them something that only big corporations in digitally mature countries need to worry about. The recent panic surrounding the massive WannaCry malware attack has changed all of that, bringing into sharp focus not […]


How insiders could compromise any corporate network with a $20 device

Kaspersky Lab researchers have examined publicly available hardware and software tools for covert password interception and discovered that a powerful hacking tool can be created for as little as $20, and just a few hours of work by someone with basic programming knowledge. In an experiment they used a DIY Raspberry Pi-based USB device, configured […]


dormakaba biometric entrance systems locks in value for business

When it comes to access control for businesses, one of the most effective identification technologies available is biometric finger recognition. This is according to Guenter Nerlich, Executive Manager, EAD Solutions – Access & Workforce Management at dormakaba, a leading global manufacturer of products, solutions and services for secure access to buildings and rooms. Nerlich says […]


McAfee expands machine learning capabilities to strengthen human-machine teams

McAfee has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums, free apps and more, giving OpenDXL users easy access to ideas and resources available for application integrations. These new advances build upon the company’s […]


New McAfee report reveals secrets of successful threat hunters and SOCs

McAfee, one of the world’s leading cybersecurity companies, has announced the release of ‘Disrupting the Disruptors, Art or Science?’, a new report investigating the role of cyberthreat hunting and the evolution of the security operations centre (SOC). Looking at security teams through four levels of development – minimal, procedural, innovative and leading, the report finds […]


Browse our latest issue

Intelligent CISO

View Magazine Archive