Insights

How to manage network risk using fluid security

With organisations utilising new technologies in the age of Digital Transformation, it is vital that the security surrounding innovation is up to standard. Amrit Williams, Vice President of Products at Skybox Security,...

Huawei predicts 10 emerging trends in telecom energy in next five years

Huawei releases 10 emerging trends in telecom energy in 2025, aiming to provide a reference for operators on site infrastructure construction. 5G is coming. Telecom networks need to undergo these three significant...

What best practice approach should businesses take to password security?

Password protection is a critical component of a strong business cybersecurity strategy. Kevin Curran, Senior Member of the IEEE and Professor of Cybersecurity at Ulster University, says that the number one rule for...

Ding CTO celebrates African females working in technology

Barbara McCarthy, Global CTO at international mobile top-up platform Ding whose African operations are headquartered in Cape Town, tells us about how African women are making a huge contribution to technology. She tells...

The compromise and misuse of privileged identity

As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. Peter Draper, Technical Director EMEA, Gurucul, discusses how...

How C-level execs can better understand insider risk

In the digital era, it is easy to be blinded by the lights of new technologies. However, this can cause us to disregard the factors which pose a threat to insider risk. Tony Pepper, CEO, Egress, discusses insider...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive