Industry Expert

Protecting your enterprise with Privileged Access Management

With traditional perimeter security tools unable to cope with advanced cyberattacks, John Hathaway, Regional Vice President – Middle East and India at BeyondTrust, tells Intelligent CIO about the benefits of...

Ethics, citizenship and protecting human rights in the digital age

Fraud and identity theft, hacking, electronic vandalism, cyberterrorism and extortion, cyberstalking, invasion of privacy, cyberbullying and offensive material are just some of the digitally enabled crimes or illicit...

Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business...

Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand...

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus,...

LanDynamix MD on how organisations can prevent security breaches

Peter Clarke, Managing Director, LanDynamix  – leading cybersecurity and managed services specialists – expands on the question:  What steps can organisations take to prevent security breaches?...

Browse our latest issue

Intelligent CISO

View Magazine Archive