The mind-boggling puzzle of cybersecurity
By Industry Contributor 2 June 2022Keeping pace with all the tools and technologies that provide protection from the cybersecurity onslaught can be overwhelming, but not impossible, says Colin Thornton, Chief Commercial Officer at Turrito Networks. FULL STORY >
Ready Player One for VR?
By Staff Writer 27 May 2022Are we ready for full immersion into VR? Kaspersky has weighed in with some predictions on the risks and potential of virtual reality. FULL STORY >
Addressing cybersecurity and climate change for a sustainable society
By Industry Contributor 26 May 2022As leaders from around the world get together at Davos to discuss the critical issues that are impacting the sustainability of our planet and society, they must consider both climate change and cybersecurity as integral to... FULL STORY >
Be on guard as Russia’s war on Ukraine could have global cybersecurity consequences
By Staff Writer 24 May 2022There is growing concern that the sanctions imposed on Russia could force cyber crime syndicates to think outside the box, potentially leading to a rise in cybercrimes, warns Martin Potgieter, Nclose’s... FULL STORY >
A year-long Chinese Cyber Espionage Campaign in Russia now targets Defence Research Institutes
By Staff Writer 24 May 2022Check Point Research (CPR) has detected an ongoing, cyber espionage operation targeting Russian defence research institutes. FULL STORY >
The high walls of data security
By Industry Contributor 18 May 2022Privacy, data security, digital identity – walled security gardens are becoming increasingly important tools for organisations looking to embed robust security says Aaron Thornton, CSO at Turrito Networks Chief Service Officer at Turrito Networks FULL STORY >
Password management needs a rethink
By Industry Contributor 18 May 2022By Geshan Naicker, IT Manager at Itec FULL STORY >
Preventative infrastructure maintenance is key to saving costs and driving safety in smelting and processing sector
By Industry Contributor 12 May 2022By Otto Botha, MD at Waco Engineering Services FULL STORY >
Cybersecurity gap portends lucrative job opportunities
By Staff Writer 11 May 2022A new Cyber Security Skills Pipeline survey has revealed the skills, qualifications and attributes employees need now step foot onto a potentially career track. FULL STORY >
SA businesses have more mobile workforces now – which means a greater need for cloud security amidst uptick in cyberattacks
By Staff Writer 6 May 2022The uptick in cloud cyberattacks on South African organisations have illustrated just how vulnerable our country’s sectors are to bad actors and cyber assaults, which... FULL STORY >
The post-pandemic era and the Metaverse - are we ready?
By Industry Contributor 5 May 2022By George Senzere, solutions architect: Secure Power at Schneider Electric FULL STORY >
Corporations protected – but not secure
By Staff Writer 29 April 2022The State of Cybersecurity in South Africa revealed today that half of South African large businesses are over budget on cybersecurity spend, and just over half feel there are now more threats introduced by remote work culture. FULL STORY >
AI in payments - it is safer for everyone when machines know us best
By Press Release 29 April 2022Card-not-present fraud remains a real threat to South African shoppers, accounting for 80 percent of credit card and 54 percent of debit card fraud last year according to SABRIC statistics. FULL STORY >
Logicalis target digital-first leaders with launch of managed Intelligent Connectivity service
By Press Release 29 April 2022Logicalis, a global IT solutions and managed service provider, today announces the launch of Intelligent Connectivity, a solution designed to empower digital-first customers to improve business... FULL STORY >
The State of Cybersecurity in SA 2022 - the good and the bad
By Staff Writer 29 April 2022Nearly three quarters of South Africa’s top 100 corporates are investing more in cybersecurity than the industry average, but an almost equal proportion don’t feel fully protected by their current cybersecurity strategy. FULL STORY >
Most Read Articles

Have Your Say
What new tech or developments are you most anticipating this year?


