Insights

BeyondTrust expert on privilege security for the new perimeter

Morey Haber, Chief Technology Officer, BeyondTrust, explains why a comprehensive approach to privileged access management (PAM) – which encompasses not just the full community of credentialed users but also...

Everything you need to know about cyberinsurance

Ricardo Arroyo, Sr. Technical Product Manager and ThreatSync Guru at network security company WatchGuard Technologies, discusses everything you need to know about cyberinsurance – what it is, why...

Westcon-Comstor expert on how to prepare for Blockchain technology

How can organisations investing in Blockchain solutions prepare their security team for the impact of the technology? By Andrew Potgieter, Director Security Solutions at Westcon-Comstor Although Blockchain...

Oracle expert on how Nigerian businesses can be secure in the cloud

Cloud technology has opened up numerous opportunities for businesses but there are some concerns about the level of security it offers. Adebayo Sanni, MD of Oracle Nigeria, looks at how businesses can stay secure...

J2 Software offers enterprise-grade security for SMEs in South Africa

Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable, according to John McLoughlin, CEO of J2, a leading supplier of information...

Hacks show why businesses can’t underestimate weak authentication impact

Article by: David Vergara, Head of Security Product Marketing at OneSpan From healthcare organisations, to airlines and some of the world’s biggest technology companies, data breaches have impacted virtually...

Browse our latest issue

Intelligent CISO

View Magazine Archive