Blogs

Stand to lose everything through lack of awareness

There are a growing number of attacks and almost all of the successful ones have come from an insider being compromised through deception, negligence or a lack of awareness. J2 Software CEO John McLoughin says...

Tackling the trillion dollar identity fraud crises

Online identity theft syndicates are dealt a significant blow as proven remote digital identity technology platform goes mainstream. Fraud costs trillions of dollars to world economies annually and, for consumers...

Check yourself before you recommend yourself

Capturing and storing biometrics as proof of identification is becoming increasingly commonplace, especially in the digital age we live in today. Pine Pienaar, Managing Director at Afiswitch, analyses why many...

Altron Karabina expert on how to prevent cloud application attacks

Sebastiaan Rothman, Senior Consultant Applications and Infrastructure at Altron Karabina, looks at what organisations can do to prevent cloud application attacks. Broadly speaking, cloud-based applications typically...

Successfully managing risk in today’s digital environment

Business agility has become a critical enabler in today’s digital environment, and yet outages can take it away with one snap of the fingers. Kate Mollett, Regional Manager for Africa at Veeam, looks at what you can d...

Why network breaches are making CIOs/CISOs positions more challenging

CIOs and CISOs across industries are regularly moving between positions and companies because of network breaches. Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company, tells us how to ...

Browse our latest issue

Intelligent CISO

View Magazine Archive