Blogs

Security spend and priorities – is your business getting it right?

Bernice Binet, F5 Brand Executive at South African based IT service management company EOH, analyses why organisations spend 90% of their security budget securing the perimeter of their systems when 77% of cyberattacks...

Old IoT vulnerabilities: A botnet gift that ‘keeps on giving’

Bryan Hamman, Territory Manager for Sub-Saharan Africa at NETSCOUT Arbor, warns that it’s not only obvious IoT devices like fitness wearables and watches that are at risk; so are commonly overlooked devices like IP ca...

Fortinet SA expert looks at the financial cybercrime trends for 2019

Doros Hadjizenonos, Regional Sales Director for Fortinet in South Africa, looks at the cybercrime trends in the financial services industry. The same concept holds true for cybercrime and the financial services...

IDC expert on how to prevent the rise in cryptocurrency mining attacks

By Kieran Frost, Research Manager, IDC South Africa Cryptomining attacks (commonly known as ‘cryptojacking’) are the among the most prevalent threats organisations currently face, by 8,500% in 2017 according to Sym...

Mimecast expert says data security sits at the heart of democracy

Thomas Mangwiro, Public Sector Security Specialist at Mimecast, says hackers and hostile cyber forces pose not only a threat to individual citizens or businesses, but entire countries, including South Africa. Military...

Trend Micro VP on the security challenges facing the multi-cloud

The current debate on the table is the adoption of a multi- or dispersed-cloud approach and what this means to security. According to Trend Micro there are some security factors that need to be considered when...

Browse our latest issue

Intelligent CISO

View Magazine Archive