Blogs

Rethinking data security with a risk adaptive approach

Christo van Staden, Forcepoint Regional Manager for Sub-Saharan Africa, says the two megatrends of cloud-based applications and mobile devices have been a boon for company productivity, agility, and innovation. The...

High cost of cybercrime in Africa cause for concern

Ken Munyi, Country Manager at IWayAfrica Kenya, says African businesses need to take more decisive steps to prioritise data protection and enhance enterprise security in order to mitigate the high cost of...

BeyondTrust expert on how to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices...

Biometric advancement predictions for 2018

Article by: Tom Harwood, Chief Product Officer and Co-Founder at Aeriandi “As it stands, it is estimated that between 30 percent to 50 percent of all fraud incidents are initiated with a phone call, meaning...

ANSecurity’s technical director warns of potential security breaches

Criminal services expand As predictable as day follows night, 2018 will see more high profile breaches impact large and well-known companies. What will be less visible to the public will be the activities of...

Biometric security predictions for 2018

Can biometrics replace any existing authentication technology today? Yes, biometrics can replace existing authentication technology today but there is a lot of work to be done and additional security layers are needed...

Browse our latest issue

Intelligent CISO

View Magazine Archive