0 comments

Password management needs a rethink

By Industry Contributor 18 May 2022

By Geshan Naicker, IT Manager at Itec FULL STORY >

0 comments

Cybersecurity gap portends lucrative job opportunities

By Staff Writer 11 May 2022

A new Cyber Security Skills Pipeline survey has revealed the skills, qualifications and attributes employees need now step foot onto a potentially career track. FULL STORY >

0 comments

SA businesses have more mobile workforces now – which means a greater need for cloud security amidst uptick in cyberattacks

By Staff Writer 6 May 2022

The uptick in cloud cyberattacks on South African organisations have illustrated just how vulnerable our country’s sectors are to bad actors and cyber assaults, which... FULL STORY >

0 comments

Corporations protected – but not secure

By Staff Writer 29 April 2022

The State of Cybersecurity in South Africa revealed today that half of South African large businesses are over budget on cybersecurity spend, and just over half feel there are now more threats introduced by remote work culture. FULL STORY >

0 comments

The State of Cybersecurity in SA 2022 - the good and the bad

By Staff Writer 29 April 2022

Nearly three quarters of South Africa’s top 100 corporates are investing more in cybersecurity than the industry average, but an almost equal proportion don’t feel fully protected by their current cybersecurity strategy. FULL STORY >

0 comments

Mobile diversity: the security of mobility

By Staff Writer 28 April 2022

It has become critical for companies to secure every endpoint and device in the world of hybrid and remote working, says Anna Collard. FULL STORY >

0 comments

Low-level implants, cryptocurrency hunt and geopolitical attacks: What APT actors got up to in Q1 2022

By Staff Writer 28 April 2022

According to Kaspersky’s latest APT trends report for Q1 2022 Advanced Persistent Threat (APT) actors had a busy quarter. Both recently uncovered and ongoing campaigns conducted by new and... FULL STORY >

0 comments

When it comes to keeping kids safe online, don’t limit them – empower them

By Industry Contributor 22 April 2022

By Simeon Tassev, MD and QSA at Galix FULL STORY >

0 comments

Phish me tender, phish me true, these phish are all for you

By Staff Writer 19 April 2022

Phishing remains the most successful threat action when it comes to data breaches, successful hacks and social engineering. Anna Collard from KnowBe4 Africa explains why, and what you can do. FULL STORY >

0 comments

From criminal enterprise to big business: The evolution of ransomware

By Staff Writer 14 April 2022

Ransomware is reaching new, dangerous levels of sophistication, as today’s ransomware attack landscape has been wreaking havoc in large enterprises in South Africa and across the globe. Patrick Evans explains. FULL STORY >

0 comments

The battle of AI & ML in the cybersecurity world

By Industry Contributor 12 April 2022

Jack Chan, Vice President, Product Management at Fortinet unravels the role AI and machine learning are playing - and how to stay secure as these technologies continue to expand. FULL STORY >

0 comments

The 5 most common security concerns in the emerging new Web 3.0 world

By Industry Contributor 12 April 2022

Fady Younes, Cybersecurity Director for Cisco Middle East and Africa unpacks the metaverse, our new Web 3.0 world and the types of security considerations they are bringing into the picture for businesses globally. FULL STORY >

0 comments

Lazarus distributes Trojanized DeFi app to steal cryptocurrency

By Staff Writer 4 April 2022

The advanced and persistent actor, Lazarus – infamous for its growing financial motivations, has hit cryptocurrency businesses with new, Trojanized decentralized finance (DeFi) apps FULL STORY >

0 comments

Quick, cheap and dangerous: how scammers are creating thousands of fake pages using phishing kits

By Staff Writer 1 April 2022

Kaspersky researchers have revealed that in 2021 they blocked 1.2 million individual phishing pages based on 469 phishing kits — which are ready-made fake page templates, that allow... FULL STORY >

0 comments

Zero Trust cybersecurity approach vital for besieged local businesses

By Industry Contributor 31 March 2022

By Andre Lombaard, Technical Manager: Security at Datacentrix FULL STORY >

(Page 13 of 35) 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (22 votes)
Better business applications (132 votes)