Insights

BeyondTrust expert on how to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices...

How AI-based machine learning could affect IT security

By Rabih Itani, Regional Business Development Manager – Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company. Artificial intelligence (AI) has been a hot topic of discussion in many...

Poor security practices hit productivity first, expert says

There’s no doubt that cyberbreaches and attacks can have serious consequences but Brian Chappell, Senior Director, Enterprise and Solution Architecture, BeyondTrust says that  although there are plenty of...

Building resilience against distributed threats at government level

Bryan Hamman, Arbor Networks’ territory manager for Sub-Saharan Africa, discusses where South Africa stands in terms of government awareness of DDoS threats, and activities that should be taken to protect...

Eight things CISOs need to remember about multi-cloud security

Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organisations now adopting multi-cloud environments, the breadth and depth of the attack surface has expanded...

The tricks cybercriminals are using to hide in your phone

  Malware in the official Google store never stops appearing – it is a ‘huge victory’ for cybercriminals to sneak their malicious applications into the marketplace of genuine apps. Denise Giusto...

Browse our latest issue

Intelligent CISO

View Magazine Archive