Top Stories

Black Friday and Cyber Monday reflect growing digital evolution

With digital transformation initiatives permeating everything business does, the Black Friday and Cyber Monday period this year is expected to illustrate just how far online retailers have come in embracing...

Threat actors could use third party software to gain entry into enterprises

In the coming year, the world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and...

10 steps to stop lateral movement in data breaches

Article by Brad Hibbert, Lead Solutions Strategist at BeyondTrust As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related...

AfricaCom: know-how is key to driving Africa’s 4th Industrial...

The 20th staging of AfricaCom opened its doors this morning in Cape Town, South Africa, and began to welcome over 13,000 delegates. The biggest Africa-focused technology, media and telecoms (TMT) event in the world,...

IT cannot be developed in silos: NITDA at GITEX 2017

At GITEX 2017, Intelligent CIO Africa caught up with NITDA’s Director General/CEO, Isa Ali Ibrahim Pantami, to discuss the importance of Nigeria’s participation at the event and the current forecast for...

10 areas to strengthen your security and risk mitigation strategies

The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive