Industry Expert

10 steps to stop lateral movement in data breaches

Article by Brad Hibbert, Lead Solutions Strategist at BeyondTrust As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related...

Why agriculture is the first frontier of African innovation

Article by Ashley Boag, Chief Business Officer at SAP Africa In 2050, Africa’s population will double to 2.4 billion people, accounting for a fifth of the global population. At the same time, the continent will need to c...

Encryption: the beer goggles of business today

Encryption has become key to protecting the privacy of electronic communication – and for certain transactions, encryption is a legal requirement – but it’s a bit like beer goggles; it makes everything look a lot rosie...

How modern storage investments help you achieve total data availability

Article by Mohamad Rizk, Manager System Engineers, Middle East at Veeam Software Data protection is essential – but what good is it if it prevents you from getting full business value from your data? Today, total data a...

An open access wireless network for South Africa? Who will manage it?

Article by Eckart Zollner, Head of Business Development, Jasco Group An open access wholesale-only wireless (3G and 4G/LTE) network (OAWN) can, within just a few years, connect the 40% of people in South Africa who...

SA’s intelligence environment sees increased growth and adoption

Article by Rousseau Kluever, Engagement Manager, Decision Inc. The adoption of business intelligence is as inescapable as cloud and big data, and as inextricably intertwined. Organisations which have adopted the...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive