Blogs

Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand...

Centrify expert on being proactive in cybersecurity hygiene measures

Threat actors are relentlessly targeting end users for their credentials to penetrate corporate networks and businesses must be proactive in their cybersecurity hygiene measures. That is according to Kamel Heus,...

Artificial Intelligence and the birth of the next generation data centre

Ian Jansen van Rensburg, VMware EMEA Senior Systems Engineer, looks at the rise of Artificial Intelligence and the birth of the next generation data centre. Artificial Intelligence has rapidly become a leading driver...

Re-thinking DDoS defences for encryption technology TLS1.3

According to NETSCOUT Arbor, the arrival of TLS1.3, the latest advance in encryption technology, is going to require a re-think of certain mechanisms for detecting and mitigating some forms of Distributed Denial of...

How quickly could a cyberattack take down critical infrastructure?

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, Doros Hadjizenonos, Regional Sales Director at security specialist Fortinet, says stakeholders need to consider the...

Change management still lacking in Digital Transformation projects

Top implementers of Digital Transformation projects are in the minority, according to a global study entitled How the implementation of organisational change is evolving, conducted by McKinsey. It was revealed that...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive