Blogs

‘Zero trust security approach is gaining acceptance’: Centrify...

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security app...

What happens after all the devices are connected to the IoT?

Africonology CEO Mandla Mbonambi asks if anyone has thought about happens after all the devices are connected to the Internet of Things? Is your business driving change or being driven by it? This is the question that...

AI poses threats to jobs, according to Bluegrass Digital MD

Artificial Intelligence (AI) and machine learning are the most exciting developments in business today; however according to Bluegrass Digital Managing Director Nick Durrant, the threats posed to jobs are a serious...

SilverBridge expert on unlocking new markets through digital innovation

African insurance providers who adopt a digital mindset can leverage innovative technologies to develop new business models and services that position them for growth. That is according to Kelly Preston, Data Analytics...

Networks Unlimited Africa MD on how to prevent phishing attacks

Employees have become key role players in the defence against phishing, and organisations can no longer rely only on IT support and technology applications only. That is according to Anton Jacobsz, MD of Networks ...

The importance of GDPR compliance for Nigerian businesses

Adebayo Sanni, Oracle Nigeria’s MD stresses that the significance of GDPR isn’t only for global companies, a small start-up in downtown Lagos serving a customer in Europe isn’t exempt from ...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive