Analysis

Cisco expert on building and securing 5G networks of tomorrow

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will create new risks. And according to Ali Amer, Managing Director, Global Service Provider...

Prevent your network from being attacked by a Botnet

Not having enough network protection may allow your organisation’s devices to be part of the next cyberattack, according to Harish Chib, Vice President, Middle East and Africa, Sophos. Botnets are large volumes...

Elingo expert looks at how instant messaging has overtaken emailing

Communication in the workplace has evolved beyond telephone calls and emails, with the digital business environment being all about real-time messaging to provide stakeholders with instantaneous responses to their...

‘Zero trust security approach is gaining acceptance’: Centrify...

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security app...

Wi-Fi hijacking is a threat to your security, says Trend Micro expert

Every device that is connected to the Internet is a potential access point for hackers, risking data and personal information. There are some inherent vulnerabilities in Wi-Fi security protocols and hardware...

Vox expert on what companies should do to minimise phishing attacks

What procedures should companies have in place to minimise phishing attacks? By Mayleen Bywater, Senior Product Manager, Cloud Security Solutions, Vox. Cybersecurity as a landscape and as a priority is changing...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive