Analysis

Proofpoint releases Cloud Application Attack Snapshot research

Proofpoint, a leading cybersecurity and compliance company, has released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over 100, 000 cloud application attacks aimed at global organisations between Septembe...

Intelligence shows that IoT bot attacks are contining

NETSCOUT Arbor, which specialises in advanced Distributed Denial of Service (DDoS) protection solutions, has shared intelligence released by its security research and analysis team – Arbor’s Security Engineering a...

Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business s...

Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand...

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus,...

LanDynamix MD on how organisations can prevent security breaches

Peter Clarke, Managing Director, LanDynamix  – leading cybersecurity and managed services specialists – expands on the question:  What steps can organisations take to prevent security breaches? Digital Tra...

Browse our latest issue

Intelligent CISO

View Magazine Archive