Industry Expert

A new way of looking at business productivity

Article by Hein Taljaard, Engagement Lead for Business Productivity Solutions at Decision Inc. Business productivity solutions have evolved significantly in recent years. Even in South Africa, workflow is taken more...

Fluctuation in the exploit kit market – temporary blip or long-term trend?

Article by Rick Holland, Vice President, Strategy, Digital Shadows Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised...

Embrace the impact of digitalisation and turn disruption into opportunity

The growth of digital technologies is seeing disruption taking place across industry sectors. For companies operating in Africa, the opportunities this presents are too significant to ignore. Long considered the next...

ROPEMAKER: email security weakness – vulnerability or application misuse?

Article by Matthew Gardiner, Senior Product Marketing Manager, Mimecast Most people live under the assumption that email is immutable once delivered, like a physical letter. A new email exploit, dubbed ROPEMAKER by...

Cloud – data compliance and security

When it comes to the adoption of public cloud computing, concerns often remain focused on privacy and data security. In a heavily regulated environment like financial services, this is often magnified and perceived...

Best practices for Privileged Access Management

Article by: John Hathaway, Regional Sales Director, Middle East, BeyondTrust Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive