Subscribe
About
  • Home
  • /
  • Contributors
  • /
  • Paul Meyer

Paul Meyer

Security solutions executive, iOCO Tech.

Paul Meyer is a security solutions executive at iOCO Tech. He has over two decades of experience in IT security technology, covering application, identity, perimeter and endpoint security. He commenced his career as a security engineer team lead and has held senior positions with multiple security vendors and ICT service providers in South Africa.

In May 2022, Meyer was appointed to the role of security solutions executive at iOCO, where he is responsible for identifying, learning and bringing security solutions to market. The role is strongly focused on technically supporting the sales process and managing vendor relations.

Articles

4:30
Security
Jul 26, 2024

Accelerate DevSecOps with the help of AI

Examining the value artificial intelligence brings to DevSecOps and the entire software development cycle.

4:50
Security
Jul 4, 2024

Artificial intelligence tools enhance application security

Unpacking some of the magic surrounding artificial intelligence and revealing what it can do to secure business applications.

3:50
Barcodes and RFID
Mar 19, 2024

The future of cyber resilience

Cyber resilience requires strategic thinking and knowledgeable partners to meet the security challenges of the future with confidence.

4:40
Security
Feb 16, 2024

Cyber resilience vital in threat-ridden business environment

The new cyber tech innovation era will enable organisations to rethink cyber security and respond to new threats amid breakneck global change.

4:30
Hardware
Sept 11, 2023

The big cyber security problem you probably never considered

In an increasingly digital world, it's absolutely vital the IT industry comes up with cyber security solutions that work for the disabled.

4:20

Unstructured data is hidden gold mine

Harnessing the power of unstructured data allows companies to discover hidden insights, uncover trends and make data-driven decisions.

4:20
Security
Mar 7, 2023

No entry: Taking control of access

An identity governance and administration programme automates provisioning of users' rights to access applications and data.

5:20
Security
Feb 21, 2023

Future of cyber security requires learning from past mistakes

To be successful, identity and access management must be approached in a planned, phased and tested manner.

4:40
Storage
Dec 13, 2022

Data discovery: Scoping the solution

CIOs and CSOs must understand what the components of an effective data discovery solution look like in order to make the right choice.

4:40
Storage
Dec 2, 2022

Data discovery is where it all begins

Do you know what data you have, where it is and who is using it? If not, you are on a highway of pain on several fronts.