Magazine Button

Thought Leadership

Pulse Secure expert on getting past the tool glut of the modern enterprise

Research has revealed that the average organisation uses multiple tools to handle VPNS, MFA, NAC, NGFW, MDM and more. But do we really need of all them? Scott Gordon, (CISSP) CMO, Pulse Secure, explores how the ‘tool sprawl’ is fast becoming a problem for companies and how in this case, more security tools does not […]


Cisco expert on securing passwords and evaporating the cloud dream

Recent research shows that some of the traditional threats and concerns such as denial of service and Cloud Service Providers data loss have over the last few years been addressed by industry and were now rated so low they have been excluded from the top ten threats to your cloud dream. Corien Vermaak, Cyber Security […]


Don’t let your cybersecurity get blindsided during the Rugby World Cup

The ninth Rugby World Cup kicks off today in Japan. The quadrennial showcase of the world’s best teams competing for the sport’s biggest prize has many South Africans eagerly anticipating a strong showing by the Springboks. But Trend Micro warns that despite the excitement building for what many expect will be the most technology-driven event […]


Adopting a cross-organisational approach to digital risk management

Digital Transformation is sweeping across the globe as business leaders recognise the many benefits it offers. But it’s important that security is not disregarded in the process. Chris Miller, Regional Director UK and Ireland, RSA Security, looks at the dark side of Digital Transformation and the cocktail of unseen risks created as IT infrastructure becomes […]


‘Effective enterprise security relies on culture, not just IT’

Hack the human. This is a growing trend understood very clearly by the well-funded and organised cybercrime landscape.  The cyber-syndicate and criminal know that it is far easier to access systems through people than it is to go through the technology. According to security software company Trend Micro, a staggering 91% of successful breaches started […]


Link11 COO on defending against the DDoS deluge from IoT devices

Marc Wilczek, COO of Link11, explores the rise in DDoS exploits that use massive botnets of IoT devices to target businesses and offers advice on how to mitigate the threats.  This year marks a significant anniversary in cybersecurity: it’s 20 years since the first DDoS attack, which took place in July 1999 when a computer of […]


Vox expert on how to ensure you have robust email security systems in place

Jurgen Sorton, Senior Product Manager for Security at Vox on what What can organisations do to ensure they have robust email security systems in place? Before we attempt to answer this question, it is important to note that having a robust email security solution in place is paramount. According to Mimecast, research shows that 91% […]


Ideco CEO gives his seven tips for biometrics success

Biometric security systems can, at first glance, seem futuristic. But they are often criticised as being expensive and impractical in many business settings. Marius Coetzee, CEO of South African identity management experts Ideco, has provided seven steps to a successful biometric implementation. Biometrics can provide the organisation an intelligent balance of security and convenience if […]


Taking action on cybersecurity: The incident response programme

Organisations across the globe are grappling with an unprecedented number of cyberthreats. It means that, for CISOs, risk management is a key strategic objective. Anna Mazzone, MD and GM of UK and Ireland, MetricStream, discusses why cybersecurity incident response programmes are so crucial in today’s business world. Across all industries, companies of all sizes recognise […]


Fortinet expert on securely accelerating cloud strategies

Alain Penel, Regional Vice President – Middle East, Fortinet, discusses how organisations can leverage the performance and flexibility of the cloud without compromising visibility or security.  Attacking web applications is the most common tactic used in data breaches, accounting for 52% of compromises. This trend has been true for several years in a row. And due to […]


Browse our latest issue

Intelligent CISO

View Magazine Archive