Insights

Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of the g...

Teams assists in enabling conservation efforts

Good collaboration and communication are key for all organisations, but for those operating in more rural locations this can be challenging to achieve. But modern technology is helping to close these gaps. Peace Parks...

Sophos accelerates growth of MSP Connect

Next-generation cybersecurity vendor Sophos, has announced accelerated worldwide growth of managed service provider (MSP) Connect, its award-winning programme to help MSPs increase customer management efficiencies,...

Vulnerability assessment, penetration testing or red teaming: which is right...

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of defending S...

Channel trust and unlocking the cybersecurity challenge

To gain the competitive advantage in the zettabyte era, as the pace of the technology revolution picks up, customers need the confidence to innovate and trusted cybersecurity strategies are a foundational pillar....

Rewriting the rules on resilient infrastructure

Taking the right steps to forming a reliable Business Continuity and Disaster Recovery strategy are firmly placed at the heart of many boardroom discussions. Steve Blow, EMEA Sales Engineering Manager at Zerto, a...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive