Analysis

F5 Networks experts on fine-tuning the boardroom and mitigating merger risks

Two industry experts from F5 Networks discuss the importance of fine-tuning the boardroom to keep pace with modern cyberthreats and offer advice on how to mitigate merger and acquisition cyber-risks. Fine-tuning the...

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces are not without their security...

Security spend and priorities – is your business getting it right?

Bernice Binet, F5 Brand Executive at South African based IT service management company EOH, analyses why organisations spend 90% of their security budget securing the perimeter of their systems when 77% of cyberattacks...

BeyondTrust expert on why biometric data poses unique security risk

Morey Haber, CTO at BeyondTrust, explores the potential security risks associated with biometric data and provides some basic recommendations that consumers should consider before handing over biometric data to...

Old IoT vulnerabilities: A botnet gift that ‘keeps on giving’

Bryan Hamman, Territory Manager for Sub-Saharan Africa at NETSCOUT Arbor, warns that it’s not only obvious IoT devices like fitness wearables and watches that are at risk; so are commonly overlooked devices like IP ca...

DR and security strategies could save your network, says Routed MD

Andrew Cruise, Managing Director, Routed, South Africa’s only vendor neutral cloud infrastructure provider, says that disaster recovery (DR) and back-up solutions remain key to business strategies for 2019. Cruise a...

Browse our latest issue

Intelligent CISO

View Magazine Archive