0 comments

When it comes to keeping kids safe online, don’t limit them – empower them

By Industry Contributor 22 April 2022

By Simeon Tassev, MD and QSA at Galix FULL STORY >

0 comments

Phish me tender, phish me true, these phish are all for you

By Staff Writer 19 April 2022

Phishing remains the most successful threat action when it comes to data breaches, successful hacks and social engineering. Anna Collard from KnowBe4 Africa explains why, and what you can do. FULL STORY >

0 comments

From criminal enterprise to big business: The evolution of ransomware

By Staff Writer 14 April 2022

Ransomware is reaching new, dangerous levels of sophistication, as today’s ransomware attack landscape has been wreaking havoc in large enterprises in South Africa and across the globe. Patrick Evans explains. FULL STORY >

0 comments

Why it is critical to have a robust cyber security strategy in place

By Industry Contributor 12 April 2022

By Charles Blackbeard, Business Development Manager, ABB Ability Digital Solutions FULL STORY >

0 comments

The battle of AI & ML in the cybersecurity world

By Industry Contributor 12 April 2022

Jack Chan, Vice President, Product Management at Fortinet unravels the role AI and machine learning are playing - and how to stay secure as these technologies continue to expand. FULL STORY >

0 comments

The 5 most common security concerns in the emerging new Web 3.0 world

By Industry Contributor 12 April 2022

Fady Younes, Cybersecurity Director for Cisco Middle East and Africa unpacks the metaverse, our new Web 3.0 world and the types of security considerations they are bringing into the picture for businesses globally. FULL STORY >

0 comments

Lazarus distributes Trojanized DeFi app to steal cryptocurrency

By Staff Writer 4 April 2022

The advanced and persistent actor, Lazarus – infamous for its growing financial motivations, has hit cryptocurrency businesses with new, Trojanized decentralized finance (DeFi) apps FULL STORY >

0 comments

Quick, cheap and dangerous: how scammers are creating thousands of fake pages using phishing kits

By Staff Writer 1 April 2022

Kaspersky researchers have revealed that in 2021 they blocked 1.2 million individual phishing pages based on 469 phishing kits — which are ready-made fake page templates, that allow... FULL STORY >

0 comments

Zero Trust cybersecurity approach vital for besieged local businesses

By Industry Contributor 31 March 2022

By Andre Lombaard, Technical Manager: Security at Datacentrix FULL STORY >

0 comments

Tackling the complexity and security of zero-day attacks in 2022

By Industry Contributor 24 March 2022

Stephen Osler, Co-Founder and Business Development Director at Nclose addresses the critical issue of zero-day attacks, and getting a grip on this debilitating threat. FULL STORY >

0 comments

Be careful of taking a bite out of that Web cookie, warns Kaspersky

By Staff Writer 22 March 2022

Kaspersky has highlighted that there are certain cybersecurity considerations to keep in mind when accepting cookies online. FULL STORY >

0 comments

When it comes to ransomware, don't forget the basics

By Industry Contributor 18 March 2022

in a recent global survey, 85% of respondents said they’re more worried about ransomware than any other cyber threat. Renee Tarun discusses the basic principles an organization needs to have a look at to protect themselves from this... FULL STORY >

0 comments

Cyber Insurance: 5 things you must know to protect your business

By Press Release 17 March 2022

In the age of booming cybercrime and growing global cyber risks, cyber insurance is a must for all digitised businesses – but what is it and how does it work? FULL STORY >

0 comments

Teens and Instagram: Practical steps parents can take to help teens navigate Instagram safely

By Industry Contributor 15 March 2022

By Carey van Vlaanderen, CEO of ESET South Africa FULL STORY >

0 comments

Securing the perimeter is not enough to protect your data – what happens if a bad actor is already inside?

By Industry Contributor 14 March 2022

The traditional ways of securing networks, like firewalls and VPNs, are no longer enough, and securing the perimeter is challenging in a remote working, borderless world. Kate Mollett... FULL STORY >

(Page 15 of 49) 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (22 votes)
Better business applications (132 votes)