Magazine Button

Top Stories

Safe online shopping best practices

Cybercrime is a rising threat for holiday shoppers. Aamir Lakhani, Cybersecurity Researcher for Fortinet’s FortiGuard Labs, discusses the causes of this and how shoppers and businesses can stay vigilant. The upcoming holiday shopping season is already expected to pose more challenges than the last. Shoppers are expected to descend upon e-commerce as many sought-after items […]


CA Southern Africa and Veracode reveal best practices for container security

As cybersecurity risks steadily increase, application security has become crucial. That means secure coding practices must be part of every developer’s skill set. Craig De Lucchi, Account Director at CA Southern Africa, explains how code is written and the steps taken to update and monitor it has a big impact on organisations and their applications. […]


Mayflex to distribute AVA Security, the cloud solution from Motorola Solutions

Mayflex, a distributor of converged IP solutions, has signed a distribution agreement with AVA to distribute its cloud-based security solution. The AVA brand is owned by the Motorola Solutions Company alongside Avigilon, Indigo Vision and Pelco which are also brands available to buy from Mayflex. AVA provides a scalable, intelligent, cloud-based security system that helps […]


Chief data officers leading the digital revolution

Using data to inform business decisions has led to a new role — the chief data officer. Here, John Salt, Co-founder of OnlyDataJobs, shares the three skills needed to succeed in the chief data officer role and explores the attributes that future candidates will have. The rise of the chief data officer role demonstrates the […]


Gartner says four actions drive finance AI success 

Four implementation behaviours are the most important in quickly delivering finance Artificial Intelligence (AI) initiatives that meet or exceed the expected impact and deliver critical finance and business outcomes, according to Gartner.  Given the infancy of AI in finance, CFOs lack a clear definition of, and strategy for, success. To support CFOs, Gartner identified four […]


Report identifies 600 mobile apps for banking, investing and cryptocurrency and examines the risk of Trojans targeting them 

Zimperium – a mobile security platform purpose-built for enterprise environments – has published new research detailing the increasing risk financial institutions and consumers worldwide face due to Trojan horse malware targeting mobile applications.   This new report titled, Mobile Banking Heists: The Global Economic Threat, examines more than 600 financial apps – which account for more than 1 […]


How to secure high-performance data

Ransomware and cyberattacks are taking place more and more frequently. High-performance environments are rich in high-value data, often containing personal, business, financial, IP, or even nationally significant data, meaning that they are at increased risk and must be protected. Yet, traditionally, data protection has not been top of mind for High-Performance Computing (HPC) users. Historically, […]


Research from OpenText reveals 85% of Singapore consumers have fresh concerns about how companies use their data

Research from OpenText reveals the growing level of concern among Singaporeans over the privacy and protection of personal data since the start of the pandemic. The survey findings demonstrate an overall lack of knowledge about what specific data is stored and for what reason, as well as a lack of trust in how organizations store […]


Lookout data shows credential theft mobile attacks on the rise in US Government agencies

Recent data commissioned by Lookout supports the fact that mobile phishing attacks are on the rise. We explore the findings in further detail, particularly focusing on the impact this is having on federal, state and local governments in the US. Steve Banda, Senior Manager, Security Solutions at Lookout, offers his expert opinion and advice on what CISOs […]


Cyberattacks on Arab countries rise in lead up to World Cup

Global eyes are on the first global football tournament to be held in the Arab world, which kicked off on Sunday, November 20, but malicious actors kicked off their World Cup-themed cyberattacks ahead of the tournament.  Email security researchers from the Trellix Advanced Research Centre have found attackers to be leveraging FIFA and football-based campaigns […]


Browse our latest issue

Intelligent CISO

View Magazine Archive