Insights

Alto Africa CTO Oliver Potgieter on securing data in the cloud

Many small business owners are more concerned about how secure their data is in the cloud but don’t worry about taking their unencrypted laptops to a local coffee shop, says Alto Africa CTO Oliver Potgieter. He...

Dandemutande CEO on seizing opportunities in Zimbabwe’s new era

As Zimbabwe courts investors and ramps up efforts to create a business-friendly environment, connectivity and communication will be key to forging a path towards the country’s digital future according to Never...

From hype to reality: Paladion expert on AI in cybersecurity

Jose Varghese, EVP and HEAD – MDR Services at Paladion, explores AI and the role it will continue to play in combating modern cyberthreats. Artificial Intelligence (AI) in cybersecurity has recently made several...

Red Hat expert on the top five ways that DevSecOps isn’t like sport

Mike Bursell, Chief Security Architect, Red Hat, discusses the similarities – and big differences – between DevSecOps and sport. There’s the World Cup, cricket, baseball, rugby, Wimbledon –...

Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text...

Sophos expert on how to identify and avoid phishing scams

Phishing might be one of the oldest tricks in the books for cybercriminals but it remains a significant threat, with sophisticated new attack methods constantly emerging. Harish Chib, Vice President, Middle East and...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive