Magazine Button

Top Stories

Industry experts comment on Collection #1 data breach

Industry experts have been providing comments on the Collection #1 data breach – the largest ever database of breached login details leaked on the Dark Web. Details of the breach were outlined by cybersecurity expert Troy Hunt, a Microsoft Regional Director, in his blog. Collection #1 is a set of email addresses and passwordsmade up of a […]


Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers – in the world of technology, these are their ‘users’. Knowing the users is of critical importance in aiding providers to manage and mitigate risks such […]


Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to a number of industry experts who offer some best practice advice to CISOs about how to tackle this challenge.     Why is it important to […]


Arxan extends leadership position in medical device app security

Arxan Technologies, a trusted provider of application protection solutions, has announced that BSI Group American Inc. has certified the company to the latest ISO 13485 Certification, the global standard for medical device quality management systems (QMS). The updated certification is assurance that Arxan meets all of the major global medical device quality system regulatory requirements […]


Sophos expert on using Deep Learning to improve security posture

In this article, Harish Chib, Vice President – Middle East and Africa, Sophos explains why organisations need an additional layer of Deep Learning enabled Endpoint Detection and Response (EDR) tools to improve their security posture. Cybercrime is big business and hackers are continually looking for new attack vectors. SophosLabs team see 400,000 new malicious samples […]


Trend Micro on what we can expect from IT security this year

The last three years in IT innovation have laid the foundation for even greater changes within the technology sphere. While some of these changes will simply build on developments in IoT, AI, smart industries and smart homes as well as the cloud, others such as the impending rollout of 5G in 2019 will herald in […]


Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies on online services to power its learning and teaching environment, a greater number of devices belonging to students or staff connected to the network are […]


PAS Global expert on how best to approach OT cybersecurity

Eddie Habibi, founder and CEO of PAS Global, is considered a pioneer and thought leader in the fields of industrial control systems (ICS) cybersecurity, Industrial IoT, data analytics and operations management. He talks to Intelligent CISO here about why IT and OT security must come together to ensure industrial facilities remain secure, using best practice guidance from Christophe […]


Cofense expert on how the human firewall helps stop phishing attacks

Phishing attacks remain a source of anguish for CISOs and security professionals. But those who choose to just throw technology at the problem are overlooking a vital component of their defence – the ‘human firewall’. Kamel Tamimi, Principal Security Consultant, Cofense Inc, tells us more… Until human nature changes (don’t hold your breath) phishing attacks […]


Mimecast expert says data security sits at the heart of democracy

Thomas Mangwiro, Public Sector Security Specialist at Mimecast, says hackers and hostile cyber forces pose not only a threat to individual citizens or businesses, but entire countries, including South Africa. Military risks immediately spring to mind. A recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be ‘easily hacked’. […]


Browse our latest issue

Intelligent CISO

View Magazine Archive