Magazine Button

More News

Exabeam partners with SecureAuth + Core Security

Exabeam, a next-gen security information and event management company, and SecureAuth + Core Security, a leader in identity security automation, have announced a collaborative relationship to secure enterprise identities against increasingly sophisticated credential-based threats. The compromise and abuse of user credentials provides the quickest way into an enterprise network and its most valuable assets. According to […]


WatchGuard unveils Trusted Wireless Environment framework

WatchGuard Technologies, a leader in advanced network security solutions, has launched its new Trusted Wireless Environment framework, a guiding resource businesses and solution providers can use to build Wi-Fi services that offer market-leading performance, scalable management and verified, comprehensive security capabilities. This new initiative seeks to upset the status quo in the wireless market, which […]


Gartner survey finds consumers would use AI to save time and money

A recent survey by Gartner has revealed that saving time and money are the top reasons why consumers would use Artificial Intelligence (AI). “AI is among the technologies that consumers consider using for tangible and more ‘serious’ benefits, as opposed to socialising, projecting self-image and having fun – three common reasons for using other personal […]


Nozomi Networks integrates with Cisco to deliver IT/ICS security

Chet Namboodri, VP, Alliances and Business Development, Nozomi Networks, outlines how Nozomi Networks and Cisco are working together to secure IT and ICS systems. Large organisations utilise a variety of technologies and solutions to create cyber-resiliency, an important part of the best practice known as ‘defence in depth’. But, using disparate systems can actually result […]


ManageEngine strengthens endpoint security with Browser Security Plus

ManageEngine, the real-time IT management company, has announced its launch of Browser Security Plus, a browser management solution that helps organisations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organisations with a layer of management capabilities for browsers and their add-ons to maintain […]


CrowdStrike and Secureworks form strategic partnership

CrowdStrike and Secureworks have announced that they will bring a new level of advanced endpoint threat detection to the marketplace by teaming up to apply Secureworks’ Red Cloak behavioural analytics and intelligence to CrowdStrike’s Falcon platform data. The joint offering delivers in one package a market-leading endpoint detection and response solution with applied analytics and […]


Xperien CEO asks if we should destroy or redeploy old equipment?

Companies must be cautious to safely dispose of data-rich electronics, especially in this rapid pace of technological and digital change. An even bigger challenge is to decide whether it is more economical to destroy or redeploy old equipment. Recycling old electronics is the right choice when they are broken and beyond repair, but equipment that […]


TrustBuilder updates its Identity Hub to version 9.2

TrustBuilder, the European identity and access management (IAM) solution provider, has introduced the latest update to its flagship identity and access management tool, the TrustBuilder Identity Hub (TrustBuilder IDHub). The TrustBuilder ID Hub is a highly effective, user friendly and trustworthy IAM tool that combines attribute-based access control with cloud identity management. The new version […]


vpnMentor research reveals the unwanted visitors getting into homes

Internet security experts vpnMentor have utilised a team of ethical hackers to uncover the most hackable smart home devices including the first-generation Amazon Echo, a Samsung Smart Camera and the first-generation Ring Smart Doorbell. 127 million smart home units are expected to be sold in the US in 2018, with the global smart home market […]


Disaster Recovery 2.0: Protecting your business from the unexpected

Whether it is fires, floods or other natural or man-made disasters, recent events have taught us that previous best practices for disaster recovery are not fit for purpose. Kate Mollett, Regional Manager for Africa South at Veeam, looks at how this paves the way for cloud and service provider technologies to provide the solution. Whether […]


Browse our latest issue

Intelligent CISO

View Magazine Archive