Feature

Embracing the work from anywhere model

Finally, there is a light at the end of the pandemic tunnel. As countries get closer to the easing of lockdowns and social restrictions, many organisations are starting to look forward to welcoming employees and...

The evolution of Digital Transformation

Digital Transformation is the incorporation of computer-based technologies into an organisation’s products, processes and strategies. Industry pundits tell Intelligent CIO Africa, how CIOs are leading their...

Securing the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Designing robust Business Continuity policies

The goal of a Business Continuity policy is to document what is needed to keep an organisation running on ordinary business days as well as times of emergency. When the policy is well-defined and clearly adhered to,...

Disaster planning in the wake of increased threat vectors

Typically, Disaster Recovery planning involves an analysis of business processes and continuity needs. Before generating a detailed plan, an organisation often performs a business impact analysis (BIA) and risk...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive