Thought Leadership

Four reasons why partners should be your A to B guide for cloud

Ossama Eldeeb, Senior Director, Partner Organisation, VMware, South EMEA, highlights the complexities associated with successful cloud adoption and why the momentum and opportunity created by digitally driven...

The evolution of network security: Why organisations need a new approach

There is no doubt that the network perimeter has changed as workforces are now spread across office, home and remote environments. Traditional approaches to cybersecurity are no longer adequate. Here, Brendan...

Zero Trust or just untrustworthy? Exploring Zero Trust fears

Zero Trust is a strategy where you assume you’ve been breached and operate as though attackers already have access to your environment. Trevor Dearing, EMEA Director of Technology at Illumio, clears up some of...

Vulnerability assessment, penetration testing or red teaming: which is right...

Red teaming is a service focused on the assessment of a company’s operational security capabilities via conducting a sophisticated attack simulation exercise and evaluating detection and response reaction of...

Channel trust and unlocking the cybersecurity challenge

To gain the competitive advantage in the zettabyte era, as the pace of the technology revolution picks up, customers need the confidence to innovate and trusted cybersecurity strategies are a foundational pillar....

Rewriting the rules on resilient infrastructure

Taking the right steps to forming a reliable Business Continuity and Disaster Recovery strategy are firmly placed at the heart of many boardroom discussions. Steve Blow, EMEA Sales Engineering Manager at Zerto, a...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive