Blogs

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus,...

Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of...

How quickly could a cyberattack take down critical infrastructure?

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, Doros Hadjizenonos, Regional Sales Director at security specialist Fortinet, says stakeholders need to consider the...

Exploring the role of cybersecurity in enterprise risk management

Anna Mazzone, MD and GM of UK and Ireland at MetricStream, discusses the role of cybersecurity in enterprise risk management. The importance of cybersecurity has never been so acute with data breaches and...

The effect of innovative technology on investigations industry

Thirty years ago, South Africa’s professional landscape looked completely different to what it is today. The investigations industry has been revolutionised by the advent of auditing firms which conduct internal i...

Forcepoint expert on resolving disruptions in the financial industry

Gregg Brans, from Forcepoint SA, looks as how to resolve potential disruptions in the financial industry.  In the current digital era, customers regularly share their personal information with organisations and as a ...

Browse our latest issue

Intelligent CISO

View Magazine Archive