Intelligent CIO Logo

Intelligent Enterprise Security

Syrex expert on the importance of thinking differently about cybersecurity

Thumbnail

With data being likened to the oil of the digital age, decision-makers cannot afford to ignore evolving cyberthreats especially given recent examples of ransomware attacks targeting local companies. Ralph Berndt, Director of Sales at cyber resilience experts Syrex, examines the importance of thinking differently about cybersecurity. “International research shows that 54% of the global respondents […]


Kaspersky Lab research reveals surge in attacks on IoT devices

Thumbnail

IoT devices were attacked with more than 120,000 modifications of malware in the first half of 2018 – more than triple the amount of IoT malware seen in the whole of 2017. That’s according to the Kaspersky Lab IoT report, with the cybersecurity vendor warning that the snowballing growth of malware families for smart devices […]


ManageEngine strengthens endpoint security with Browser Security Plus

Thumbnail

ManageEngine, the real-time IT management company, has announced its launch of Browser Security Plus, a browser management solution that helps organisations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organisations with a layer of management capabilities for browsers and their add-ons to maintain […]


Xperien CEO asks if we should destroy or redeploy old equipment?

Thumbnail

Companies must be cautious to safely dispose of data-rich electronics, especially in this rapid pace of technological and digital change. An even bigger challenge is to decide whether it is more economical to destroy or redeploy old equipment. Recycling old electronics is the right choice when they are broken and beyond repair, but equipment that […]


BitCo identifies five defence mechanisms to combat cyberattacks

Thumbnail

With unprepared businesses ending up on the firing line, Michael Colin, Sales Director at telecommunications service provider BitCo, offers five ‘easy-to-implement’ defence mechanisms. Naivety and ignorance are no longer valid excuses and owners of small and medium-sized organisations in every sector are under even more pressure to comply with data protection requirements as well as […]


Disaster Recovery 2.0: Protecting your business from the unexpected

Thumbnail

Whether it is fires, floods or other natural or man-made disasters, recent events have taught us that previous best practices for disaster recovery are not fit for purpose. Kate Mollett, Regional Manager for Africa South at Veeam, looks at how this paves the way for cloud and service provider technologies to provide the solution. Whether […]


Arcserve set for expansion with launch of Arcserve Southern Africa

Thumbnail

Arcserve – the data backup and availability pioneer – has announced the opening of Arcserve Southern Africa in a move that hails a new era in the company’s relationship with African markets. Arcserve solutions and services have a long and highly successful history in the South and sub-Saharan African region but this is the first […]


Egypt’s software piracy drop and legal reforms boost foreign investment

Thumbnail

Egypt has seen a 2% drop in its software piracy rate to reach 59%, according to a study released by US-based Business Software Alliance. It revealed that Egypt has managed to decrease the commercial value of the unlicensed software, which declined significantly from US$157m in 2015 to US$64m last year. The survey quantified the volume […]


Trend Micro expert on email hackers being defeated by AI

Thumbnail

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats, making it one of the most popular vectors in a hacker’s arsenal. The thing with hacking an email account is that the hacked account can be used for fraud. For example, a […]


Forcepoint expert on four biggest misconceptions about cloud security

Thumbnail

The widespread adoption of cloud solutions has been driven by the myriad of associated benefits offered, such as flexibility, scalability and remote access. However, Christo van Staden, Forcepoint Regional Manager: Sub-Saharan Africa, says concerns have been raised regarding the security of these solutions when it comes to keeping sensitive data safe from malicious actors. Many […]


Data breaches cause people to lose their jobs, according to report

Thumbnail

A new report from Kaspersky Lab and B2B International shows that 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs. The study, From data boom to data doom: The risks and rewards of protecting personal data, shows that 45% of […]


Xperien partners with Merchant West to offer IT life-cycle solutions

Thumbnail

Xperien has partnered with independent financial services company Merchant West to provide continuous IT life-cycle solutions, a fresh line of alternative funding to reduce the cost of IT assets. The partnership offers a full end-to-end IT Asset Life-cycle solution from acquisition to financing, management and disposal. Merchant West will structure a finance deal that reduces […]


Cisco expert on building and securing the 5G networks of tomorrow

Thumbnail

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will open up new risks. Ensuring the security of the SP network infrastructure, the business and its customers will require a holistic approach says Ali Amer, Managing Director, Global Service Provider Sales, Cisco Middle East and Africa. Every new generation […]


IDC expert on why security is vital to organisational success

Thumbnail

Security is as vital to organisational success as technology and people, says Mark Walker, Associate Vice President of Sub-Saharan Africa at International Data Corporation (IDC). Search for security on Google. The engine will autofill with – security is like oxygen and security is like an onion. Both are true. Security is the oxygen that keeps the […]


More than 40% of ICS computers attacked during first half of 2018

Thumbnail

Research shows that African countries were worse off when it comes to ICS computers that were attacked. More than 40% of all industrial control system (ICS) computers protected by Kaspersky Lab solutions were attacked by malicious software at least once during the first half of 2018. The most impacted countries were Vietnam, Algeria and Sri […]


Fortinet introduces network access control solution for IoT security

Thumbnail

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced FortiNAC, a new network access control product line that delivers network segmentation and automated responses for IoT security. The massive rise of unsecure, headless IoT devices, including industrial and medical IoT, requires new tools for securing networks. Fortinet’s new FortiNAC product line […]


Prevent your network from being attacked by a Botnet

Thumbnail

Not having enough network protection may allow your organisation’s devices to be part of the next cyberattack, according to Harish Chib, Vice President, Middle East and Africa, Sophos. Botnets are large volumes of distributed networked computers and devices that have been taken over by a cybercriminal. Botnets, also referred to as bots, are usually taken […]


‘Zero trust security approach is gaining acceptance’: Centrify expert

Thumbnail

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security approach’ is increasingly gaining acceptance. The concept of zero trust is as profound in cybersecurity as the sweeping […]


Workers across EMEA showing security fatigue, says Aruba

Thumbnail

A new study shows that workers across Europe, Middle East and Africa understand security risks and consequences, but are taking less action than global counterparts. Despite being fully aware of security risks following the introduction of high-profile legislation like GDPR, workers in Europe, Middle East and Africa (EMEA) have the worst cybersecurity discipline in the […]


Wi-Fi hijacking is a threat to your security, says Trend Micro expert

Thumbnail

Every device that is connected to the Internet is a potential access point for hackers, risking data and personal information. There are some inherent vulnerabilities in Wi-Fi security protocols and hardware components, which can make the lives of hackers that much easier. These possible entry points could provide hackers with access to networks and to […]