Magazine Button

Thought Leadership

How should organistions and enterprises approach ransomware prevention?

Last month, we reported that Vectra, a leader in network threat detection and response (NDR), disclosed that cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in Infrastructure-as-a-Service (IaaS) cloud providers.  According to the Vectra 2019 Spotlight Report on […]


Digital Guardian expert on the configuration mistakes that provide field days for hackers

Tim Bandos, Vice President of Cybersecurity at Digital Guardian, details the top five configuration gaffes that organisations must avoid to reduce the threat exposure. Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or completely preventable mistake. Common security mistakes and overlooked misconfigurations can open […]


Xperien CEO advises firms to beware of company data on private devices

Few businesses realise that the data residing on personal devices could result in a data breach. They also don’t understand that it’s possible to recover the data from damaged hard drives, broken phones, credit card machines and even memory cards. Xperien CEO Wale Arewa warns that business owners have lost track of all the devices […]


Fortinet expert on why CISOs must focus on employee development as a key security strategy

Paul Anderson, Head of UK and Ireland, Fortinet, tells us how, by focusing on employee development, enablement and buy-in, CISOs can create a centralised security strategy that builds collaboration and reallocates security teams away from tactical, reactive work to more proactive and strategic efforts. CISOs are facing a perfect storm when it comes to securing […]


Reclaiming the cloud: How CISOs can ensure security in cloud initiatives

Cloud services now play a central role in the digital operation of modern enterprises. But security teams are often being left out in the cold, increasing the level of risk an organisation is facing. Gidi Cohen, CEO and Founder, Skybox Security, tells us how CISOs can be part of the conversation on securely adopting cloud […]


Pulse Secure expert on getting past the tool glut of the modern enterprise

Research has revealed that the average organisation uses multiple tools to handle VPNS, MFA, NAC, NGFW, MDM and more. But do we really need of all them? Scott Gordon, (CISSP) CMO, Pulse Secure, explores how the ‘tool sprawl’ is fast becoming a problem for companies and how in this case, more security tools does not […]


Cisco expert on securing passwords and evaporating the cloud dream

Recent research shows that some of the traditional threats and concerns such as denial of service and Cloud Service Providers data loss have over the last few years been addressed by industry and were now rated so low they have been excluded from the top ten threats to your cloud dream. Corien Vermaak, Cyber Security […]


Don’t let your cybersecurity get blindsided during the Rugby World Cup

The ninth Rugby World Cup kicks off today in Japan. The quadrennial showcase of the world’s best teams competing for the sport’s biggest prize has many South Africans eagerly anticipating a strong showing by the Springboks. But Trend Micro warns that despite the excitement building for what many expect will be the most technology-driven event […]


Adopting a cross-organisational approach to digital risk management

Digital Transformation is sweeping across the globe as business leaders recognise the many benefits it offers. But it’s important that security is not disregarded in the process. Chris Miller, Regional Director UK and Ireland, RSA Security, looks at the dark side of Digital Transformation and the cocktail of unseen risks created as IT infrastructure becomes […]


‘Effective enterprise security relies on culture, not just IT’

Hack the human. This is a growing trend understood very clearly by the well-funded and organised cybercrime landscape.  The cyber-syndicate and criminal know that it is far easier to access systems through people than it is to go through the technology. According to security software company Trend Micro, a staggering 91% of successful breaches started […]


Browse our latest issue

Intelligent CISO

View Magazine Archive