Analysis

BitCo identifies five defence mechanisms to combat cyberattacks

With unprepared businesses ending up on the firing line, Michael Colin, Sales Director at telecommunications service provider BitCo, offers five ‘easy-to-implement’ defence mechanisms. Naivety and ignorance are no lon...

Disaster Recovery 2.0: Protecting your business from the unexpected

Whether it is fires, floods or other natural or man-made disasters, recent events have taught us that previous best practices for disaster recovery are not fit for purpose. Kate Mollett, Regional Manager for Africa...

Trend Micro expert on email hackers being defeated by AI

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats, making it one of the most popular vectors in a hacker’s arsenal. The thing with h...

Cybereason honeypot project reveals cyber-risk to energy sector

The energy sector – and the ICS (industrial control systems) that run the pumps, switches and meters responsible for powering homes and businesses – have long been on the radar of cyberattackers. Cybersecurity firm Cyb...

‘We’re at cyberwar’ – study reveals views on...

Venafi, a leading provider of machine identity protection, has announced the results of a survey of 515 IT security professionals’ views on cyberwar and nation-state security. The survey was conducted at the Black Hat c...

Forcepoint expert on four biggest misconceptions about cloud security

The widespread adoption of cloud solutions has been driven by the myriad of associated benefits offered, such as flexibility, scalability and remote access. However, Christo van Staden, Forcepoint Regional Manager:...

Browse our latest issue

Intelligent CISO

View Magazine Archive