Subscribe
  • Home
  • /
  • Contributors
  • /
  • Paul Meyer

Paul Meyer

Security solutions executive, iOCO Tech.

Paul Meyer is a security solutions executive at iOCO Tech. He has over two decades of experience in IT security technology, covering application, identity, perimeter and endpoint security. He commenced his career as a security engineer team lead and has held senior positions with multiple security vendors and ICT service providers in South Africa.

In May 2022, Meyer was appointed to the role of security solutions executive at iOCO, where he is responsible for identifying, learning and bringing security solutions to market. The role is strongly focused on technically supporting the sales process and managing vendor relations.

Articles

4:30
CIO Zone26 Jul

Accelerate DevSecOps with the help of AI

Examining the value artificial intelligence brings to DevSecOps and the entire software development cycle.

4:50

Artificial intelligence tools enhance application security

Unpacking some of the magic surrounding artificial intelligence and revealing what it can do to secure business applications.

3:50
Barcodes and RFIDMar 19, 2024

The future of cyber resilience

Cyber resilience requires strategic thinking and knowledgeable partners to meet the security challenges of the future with confidence.

4:40
Cloud ComputingFeb 16, 2024

Cyber resilience vital in threat-ridden business environment

The new cyber tech innovation era will enable organisations to rethink cyber security and respond to new threats amid breakneck global change.

4:30
DevicesSept 11, 2023

The big cyber security problem you probably never considered

In an increasingly digital world, it's absolutely vital the IT industry comes up with cyber security solutions that work for the disabled.

4:20
CIO ZoneJul 14, 2023

Unstructured data is hidden gold mine

Harnessing the power of unstructured data allows companies to discover hidden insights, uncover trends and make data-driven decisions.

4:20

No entry: Taking control of access

An identity governance and administration programme automates provisioning of users' rights to access applications and data.

5:20

Future of cyber security requires learning from past mistakes

To be successful, identity and access management must be approached in a planned, phased and tested manner.

4:40
StorageDec 13, 2022

Data discovery: Scoping the solution

CIOs and CSOs must understand what the components of an effective data discovery solution look like in order to make the right choice.

4:40
StorageDec 2, 2022

Data discovery is where it all begins

Do you know what data you have, where it is and who is using it? If not, you are on a highway of pain on several fronts.