Industry Expert

Cyber crime alert! The rise and rise of exploit kits

Cherif Sleiman, VP EMEA at Infoblox discusses the increasing prevalence and risks posed by exploit kits, the evolution of this threat and how companies can defend against them. For several months now, there has been...

Choosing the right scanner – the first step to digitalisation and efficient d...

There’s more to the capture step of document imaging than just putting paper through a scanner. Image capture is about making documents as sharp and legible as possible for online viewing, printing and reading by data e...

What’s next for Mirai and botnet DDoS attacks?

For security professionals, Mirai has become a household name. It’s the now-infamous malware that hackers use to absorb hundreds of thousands of connected devices – from routers, to DVRs, IP cameras and other gadgets – i...

Managing email security

Mimecast has conducted a survey of 600 IT security managers from organisations in the South Africa, United States, United Kingdom, and Australia. The initial findings of that survey were released in 2016. The average...

Why system, network and incident logs are so important

Every device on an enterprise network generates log data. Log data provides exhaustive information about what is happening. It records events such as start-ups and shutdowns, commands executed, login and logoff...

Cisco CSO: Africa is ripe with opportunity and innovation

According to Hilton Romanski, Cisco’s Chief Strategy Officer: “Technology is an enabler of freedom and presents unimaginable opportunities for Africa.” Speaking at Cisco Connect South Africa (sponsored by Intel), he addre...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive