Magazine Button

Top Stories

10 steps to stop lateral movement in data breaches

Article by Brad Hibbert, Lead Solutions Strategist at BeyondTrust As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related breaches leveraged either stolen and/or weak passwords. While the specific tactics may vary, the stages of an outsider attack are similar and […]


AfricaCom: know-how is key to driving Africa’s 4th Industrial Revolution

The 20th staging of AfricaCom opened its doors this morning in Cape Town, South Africa, and began to welcome over 13,000 delegates. The biggest Africa-focused technology, media and telecoms (TMT) event in the world, celebrated two decades of bringing the brightest minds in the global TMT sector with the launch of several new exhibits that […]


IT cannot be developed in silos: NITDA at GITEX 2017

At GITEX 2017, Intelligent CIO Africa caught up with NITDA’s Director General/CEO, Isa Ali Ibrahim Pantami, to discuss the importance of Nigeria’s participation at the event and the current forecast for Nigeria’s tech development. Q: Tell us a bit about NITDA. A: NITDA is an acronym of National Information Technology Development Agency. It is the […]


10 areas to strengthen your security and risk mitigation strategies

The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology. The Internet of Things (IoT) adds another layer of complexity in which applications are at the […]


Comment on Redline Communications and IT Max Global’s partnership

Redline Communications Group Inc., a leading provider of wide-area wireless networks for the most challenging applications and locations, has signed a distribution agreement with IT Max Global to offer its complete range of mission critical communications solutions across Africa. IT Max Global helps customers design, plan, integrate, deploy, and service all IT and telecom environments […]


ServiceNow survey shows CIOs delivering real value from machine learning

A new survey from ServiceNow finds that machine learning has arrived in the enterprise, making material contributions to everyday work. To realise its full value, technology leaders must find skilled talent to work side-by-side with machines in addition to redesigning their organisations and processes. For The Global CIO Point of View, ServiceNow surveyed 500 CIOs […]


Vodafone research shows SA is optimistic about business outcomes of IoT

Vodafone has released the South African findings of its fifth annual IoT Barometer Report – the leading global survey of business sentiment regarding investment and innovation in the Internet of Things. The IoT Barometer research surveyed 1,278 respondents in 13 countries: the US, Brazil, Ireland, UK, Germany, Italy, Spain, South Africa, China, India, Japan, Australia […]


Gartner survey confirms the changing role of the CIO

Digitalisation and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this year and 2018 a defining moment for CIOs who don’t want to be left behind. Gartner, Inc.’s annual global survey of CIOs showed that the CIO role is transitioning […]


BeyondTrust reveals ‘5 deadly sins’ increasing the risk of data breach

BeyondTrust, the leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorised access, has announced its annual privileged access management survey which identified the ‘Five Deadly Sins of Privileged Access Management’, and how they prevent organisations from effectively protecting sensitive information. For years, security experts have outlined best practices for privileged access management (PAM) […]


McAfee Labs sees cyberattacks target healthcare and social media users

McAfee Inc. has released its ‘McAfee Labs Threats Report: September 2017’, which examines the rise of script-based malware, suggests five proven threat hunting best practices, provides an analysis of the recent WannaCry and NotPetya ransomware attacks, assesses reported attacks across industries, and reveals growth trends in malware, ransomware, mobile malware, and other threats in Q2 […]


Fortinet warns that BlueBorne may affect billions of devices

Fortinet®, the global leader in high-performance cybersecurity solutions, urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack. While there is no evidence that such attack vectors currently exist in the wild, it is possible that […]


When businesses get bit by bytes

Whether it is due to a technical glitch, human error or, as in the recent Petya and WannaCry cases, a full-on cyberattack, as digitalisation transforms the industrial world there is a significant cyber risk for companies delivering products and services. Implementing proper risk management procedures should be top priority, including understanding the significant threat posed […]


Browse our latest issue

Magazine Cover

View Magazine Archive