Analysis

Understanding XDR in practice

The XDR detection and response approach connects the virtual dots in cybersecurity. Indi Siriniwasa, Vice President Sub-Saharan Africa at Trend Micro, tells us more. Having broader visibility into the cyber risks...

Protecting the manufacturing industry from mobile phishing attacks

The rapidly rising reliance on mobile phones in the workplace has facilitated an increased cybersecurity threat from malicious phone hackers that many manufacturers are not equipped to handle. Tom Davison, EMEA...

‘Digitisation is key to transforming African markets, but so is IT...

Markets across Africa are evolving, possibly more rapidly than ever before in history, and this is largely due to continuous advances in and the growing uptake of digital technology. In commemorating Africa...

Cybersecurity and aviation: Combatting the key threats

The aviation sector is being increasingly digitised which, while providing numerous benefits for consumers and passengers, also introduces new risks and makes the industry a hot target for cybercriminals. Industry...

Hiding in plain sight – what are the key indicators of an insider threat?

How do you identify an attacker who is supposed to be accessing sensitive data as part of their job role? Although they are notoriously difficult to identify there are, nonetheless, tell-tale signs that indicate the...

More than one in three enterprises say cloud apps are the most vulnerable to...

According to the results of a new survey by Securonix, the cloud not only makes enterprises vulnerable to insider attacks, it makes those attacks even more difficult to detect. In the 2019 Insider Threat Report, 39%...

Browse our latest issue

Intelligent CISO

View Magazine Archive