Intelligent CIO Logo

Insight

Five ways for finance professionals to seize the technology opportunity

News Thumbnail

African finance professionals must not miss the golden opportunity technology offers to enhance their ability to compete successfully in the continent’s growing business sector, says Theuns Holtshousen, Divisional Business Leader, CaseWare Africa. “As Africans we are using technology freely in our private lives, but as finance professionals, we are not yet capitalising on the opportunities […]


Gemalto: companies face losing 70% of consumers following a data breach

News Thumbnail

A majority (70%) of consumers would stop doing business with a company if it experienced a data breach, according to a survey of more than 10,000 consumers worldwide conducted on behalf of Gemalto, the world leader in digital security. In addition, seven in ten consumers (69%) feel businesses don’t take the security of customer data […]


Two-factor authentication should be a staple for security today

News Thumbnail

The tools for two-factor authentication have been available for about a decade and in an era of increasing cybercrime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to multi-factor authentication, an alarming number of companies rely exclusively on […]


Four character traits all successful CIOs share

News Thumbnail

As the digital leaders of an organisation, the CIO needs to build solid relationships with other business leaders, go the extra mile to foster digital learning, know what they’re talking about and be open to teaching others. There’s no denying that the role of the CIO has changed, and continues to change as business and […]


McAfee Labs previews five cybersecurity trends for 2018

News Thumbnail

McAfee Inc. has released its McAfee Labs 2018 Threats Predictions Report, which identifies five key trends to watch for in 2018. This year’s report focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes, long-term implications […]


Cloud-based archiving: an effortless way to centralise data management

News Thumbnail

Data management and specifically data archiving is critical to businesses in their quest to gain better control over their IT environments. There are two distinct ways to do this: tape archiving or cloud archiving, and the latter is gaining more prominence says Redstor, an international data management and security specialist firm. The company defines data […]


The future of fake news and how to lessen the risk for your business

News Thumbnail

Article by Rick Holland, VP Strategy, Digital Shadows Hardly a day goes by without media and sometimes government claims that Russia has been utilising social media tools to spread fake news and misinformation to influence everything from elections, mining approvals and even Brexit. But Russia is just the tip of the iceberg for this issue […]


Making the Internet of Things a reality in Africa

News Thumbnail

Although the Internet of Things (IoT) is still in the early stages in Africa, it is starting to gain traction in Africa across different verticals. The maturity level varies between different markets, with some in the exploring phase and others with much more concrete IoT plans. As the maturity level increases, the ecosystem will follow […]


2018 predictions: entering the next era of human machine partnerships

News Thumbnail

Article by Mohammed Amin, Senior Vice President, Middle East, Turkey and Africa at Dell EMC Our research partners at The Institute for the Future (IFTF) recently forecast that we’re entering the next era of human machine partnership, and that between now and 2030 humans and machines will work in closer concert with each other, transforming […]


Secure, trusted Internet critical to advancing African economy

News Thumbnail

Many African countries have made significant progress towards creating an Internet sector, with broad reforms that focus on increasing broadband availability. There have been further successes within countries in developing online platforms, fostering growth of local companies and increasing the incentive to go online, according to a new report launched by the Internet Society, a […]


Don’t become a victim of cybercrime this Black Friday

News Thumbnail

Article by John Shier, Senior Security Advisor, Sophos 1. If an online deal or email offer with price discounts looks too good to be true, it probably is Hit delete immediately. It’s common knowledge that though there are some great deals to be had over Black Friday, most products are cheaper or the same price […]


Automated data protection? Absolutely critical says Redstor

News Thumbnail

The theft of data is so prevalent, so orchestrated and serious, it requires technology that is just as quick and equal to the task of providing effective protection. Because theft is automated, the security should also be automated say executives from Redstor, a specialist data management and security company. Data theft is lucrative business and […]


Cybersecurity experts comment on the Uber data breach

News Thumbnail

James Chappell, CTO and co-founder, Digital Shadows: News that taxi app company, Uber, was hacked in 2016 – with statements confirming that 57 million customers and 600,000 drivers’ personal details were compromised and potentially stolen – should not really come as a surprise. While you could be surprised that such an effective architect of the […]


Black Friday and Cyber Monday reflect growing digital evolution

News Thumbnail

With digital transformation initiatives permeating everything business does, the Black Friday and Cyber Monday period this year is expected to illustrate just how far online retailers have come in embracing availability. Veeam Software examines what needs to be done for companies to maximise their sales by reducing the chances of downtime, and the catastrophic effect […]


From ugly duckling to swan: the metamorphosis of WAN to SD-WAN

News Thumbnail

The software-defined WAN (SD-WAN) is coming to the rescue of network managers by helping them to easily manage their network in disparate locations – from urban to rural – through a single interface. Best of all, the technology runs in the cloud as a Software as a Service (SaaS), which is of benefit to both […]


True innovation-led business transformation starts in the cloud

News Thumbnail

Article by Cameron Beveridge, Director: Cloud at SAP Africa No matter your industry sector or geographic location, all businesses today have one overriding thing in common: to be successful and sustainable you must be digital. While the rewards of moving a business towards digital are considerable, the initial transition can be challenging. Innovation requires the […]


Fake news ‘as a Service’ on the rise according to Digital Shadows

News Thumbnail

New research indicates that criminals are increasingly exploiting the growth of ‘fake news’ for commercial gain. The growth of so-called fake news has traditionally been associated with the political sphere and executed for ideological purposes. However, research conducted by analysts at Digital Shadows reveals the growth of toolkits and services – available for just $7 […]


DDoS mitigation is the best practice in an IoT world

News Thumbnail

The Internet of Things (IoT) is a conversation that has been gathering momentum in the public space for around the past five years or so, even though the concept has been around for a few decades. And yet, in this brand-new world of science fiction coming to life, threats lurk also. So says Arbor Network’s […]


The shift from prevention technology to deception and response

News Thumbnail

Intelligent CIO caught up with Ray Kafity, Vice President, Middle East, Turkey & Africa at Attivo Networks to discuss the company’s forecast for upcoming industry trends and how they are witnessing new technologies such as IoT changing the threat landscape. Q: Since the product launch in June this year, has Attivo made any adaptations to […]


Threat actors could use third party software to gain entry into enterprises

News Thumbnail

In the coming year, the world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and mitigate, according to Kaspersky Lab’s Targeted Threat Predictions for 2018. Other hard-to-block attacks, such as those involving high-end mobile malware are […]