Intelligent CIO Logo

Editor's Choice

Forecepoint Regional Manager on when cybercriminals go to work

What procedures should companies have in place to minimise phishing attacks? Christo van Staden, Forcepoint Regional Manager: Sub-Saharan Africa Phishing, spear phishing and ransomware represent serious threats to any organisation. They can be used to steal money, extort ransom payments, exfiltrate intellectual property, disrupt business operations and, in extreme cases, actually put a company out […]


Networks Unlimited Africa MD on how to prevent phishing attacks

Employees have become key role players in the defence against phishing, and organisations can no longer rely only on IT support and technology applications only. That is according to Anton Jacobsz, MD of Networks Unlimited Africa. Phishing is the fraudulent practice of sending e-mails, supposedly from a trustworthy source, to entice individuals to reveal personal and […]


EIB support to help unlock Great North Road’s potential for Zambians

The European Investment Bank (EIB) has signed a €110 million (ZMK 1.27 billion) concessional loan with the Zambian Ministry of Finance in support of the Great North Road (T2), which will be followed by the signature of an EU grant of €72.45m that will complement EIB financing. Support for a regional project The overall project, […]


Give your business the technical edge to beat cybersecurity skills gap

Ned Baltagi, Managing Director, Middle East and Africa at SANS, says training can be the most efficient and thorough way to rapidly ramp up technical skills. Business today is dominated by the Digital Transformation; therefore, the more technically sound IT staff are, the more value they can bring to their organisation. This is true of […]


Get to Know: Gareth Hawkey, Group CEO at redPanda Software

What would you describe as your most memorable achievement? It is quite difficult for me to pinpoint my most memorable achievement as there are two key achievements that have led me to where I am today. The first is having the opportunity to travel. It might not sound like an achievement in itself, but long […]


Redstor expert on what firms should have to safeguard their data

What procedures should companies have in place to safeguard their data? By Heidi Weyers, General manager for Sales at Redstor in SA. Given the exponential growth of data and increasing threat of sophisticated cyberattacks, there is absolutely no doubt that a secure backup is essential to any credible data management strategy. Backup is required to […]


AppCentrix expert on importance of safeguarding your data

What procedures should companies have in place to safeguard their data? By Omar Sati, Executive Board Member at AppCentrix International When thinking about their data, organisations primarily concern themselves with data management and processing, but the scope extends well beyond this and should now include specific requirements such as data security and transparency. Especially considering […]


Oracle expert on importance of privacy of data and how to protect it

Article by Dragan Petkovic, Security Product Leader ECEMEA at Oracle.  Privacy of data remains one of the most vulnerable resources and the requirement to protect personal data is only intensifying with the likes of the GDPR and PoPI Act coming into effect. We are likely to see steep fines being imposed during the second half […]


SAP Africa expert on what you need when adopting the public cloud

What strategies should organisations have in place when adopting the public cloud? By Akesh Lalla – SAP Africa Cloud Solutions Lead. Businesses are constantly challenged to improve their operations and transform their business to keep pace with the digital economy, whether by executing excessive growth strategies, usually through mergers and acquisitions (M&A), or continuous introduction of […]


BeyondTrust expert on how to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices for incident response. The methodologies vary greatly based on the sensitivity of the data and requirements to notify law […]


Oracle expert on what you should have when adopting the public cloud

What strategies should organisations have in place when adopting the public cloud? By Itayi WP Mandonga, Oracle PaaS Cloud Champion (South Africa) Cloud computing is now broadly accepted as an economical way to share a pool of configurable computing resources. No one solution works for every business. Flexibility is great, but with so many choices, […]


PBT Group expert: Security should underpin a cloud strategy

What strategies should organisations have in place when adopting the public cloud? By Yolanda Smit, Regional Director (Gauteng) at PBT Group. Cloud remains a topic, which is continually debated among business. While it can be complex to move or integrate completely into the cloud, the possibilities that the cloud can open for a business, means it […]


SUSE expert on what strategies you need when adopting the public cloud

What strategies should organisations have in place when adopting the public cloud? By Matthew Lee, Regional Manager for Africa at SUSE African attitudes towards the cloud over the years have changed drastically with companies moving at least some of their processes to a hosted environment, the migration is bringing with it a realisation of business […]


SANS expert on the importance of cyberthreat intelligence

Is Cyberthreat intelligence becoming increasingly important in the battle against cybercrime? By Dave Shackleford, SANS Analyst and Senior Instructor. As the threat landscape continues to evolve and become more complex and attackers take advantage of new vulnerabilities and techniques, security teams need all the help they can get to more effectively prevent, detect and respond […]


Genetec expert on the expected increase in ransomware

What can we do about the expected increase in ransomware and cyberextortion tools? By Firas Jadalla, Regional Director, Middle East, Turkey and Africa, Genetec Inc. Physical security systems and devices, including cameras and door controllers, are smarter and more powerful than ever before. As part of both public and private networks, they are increasingly interconnected […]


Oracle spokesman on why Egypt is one of the company’s top markets

The journey to cloud isn’t a one-way path – each company’s journey is unique. Abdul Rahman Al Thehaiban, Senior Vice President (Technology), Middle East and Africa, Oracle, explains why Egypt is one of the company’s top markets. “At Oracle, we have built a completely integrated cloud platform that spans all layers of the cloud and […]


The impact of digital transformation on economic growth in Africa

As African organisations undergo digital transformation, understanding this massive shift and how to harness it will be vital for organisations across the continent, according to Mandla Mbonambi, founding CEO of Africonology. Access to information, new ways of doing things and consumer consumption patterns will continue to force African organisation to digitise their products and service […]


‘Intelligence’ underpins a valuable cybersecurity approach

Expert opinion piece by Riaan Badenhorst, General Manager, Kaspersky Lab Africa. The continued hype centered towards the topic of cybercrime is no hype at all. It is a very real and growing issue that still needs tangible and immediate attention. In fact, Kaspersky Lab’s recently presented Cybersecurity Trends in the Middle East, Turkey and Africa (META) […]


Infoblox expert on the importance of cyberthreat intelligence

Is cyberthreat intelligence becoming increasingly important in the battle against cybercrime? By Ali Sleiman, Technical Director MEA, Infoblox Threat intelligence is analysed information about the intent, opportunity and capability of malicious actors. This is where the planning phase becomes important, today’s organisations are required to understand their own environment first and then understand the challenges […]


Expert opinion: Is cyberthreat intelligence becoming important?

Is cyberthreat intelligence becoming increasingly important in the battle against cybercrime? By John McLoughlin, MD, J2 Software Cyberthreat intelligence is not becoming increasingly important. Cyberthreat intelligence is already critically important in the battle against cybercrime. It is just unfortunate that so many do not make use of service providers and platforms that provide access to […]