Overcoming cyber overwhelm: three security goals to focus on in 2023
By Industry Contributor 1 December 2022Danny Allan, CTO at Veeam Software addresses the three security goals that businesses and IT professionals should be focusing on for 2023. FULL STORY >
Cybersecurity talent in Africa: The challenges we face and the solutions we need
By Industry Contributor 29 November 2022Conrad Steyn, CTO and Head of Engineering for Sub-Saharan Africa at Cisco, expands on cybersecurity talent in Africa, the challenges we face and the types of solutions needed. FULL STORY >
Cyber Immunity is the new normal: Kaspersky aims to protect connected cars
By Staff Writer 22 November 2022At its annual Kaspersky Cyber Security Weekend META the company announced that it is developing an Automotive Gateway to help manufacturers meet the new UN Cyber Security Requirements for Smart Vehicles. FULL STORY >
Why hacking yourself regularly is the best way to stay safe
By Industry Contributor 22 November 2022By Richard Frost, Product Head: Cybersecurity at Armata FULL STORY >
The hidden price tag of Black Friday: The most popular scams and how to avoid them
By Industry Contributor 17 November 2022The promise of a great bargain is attractive for SA shoppers, but cybercriminals have special scams of their own in store warns Carey van Vlaanderen, Chief Executive Officer at ESET Southern Africa. FULL STORY >
FortiGuard Labs: Expect convergence of advanced persistent threat methods in 2023
By Staff Writer 15 November 2022Fortinet unveils predictions from the FortiGuard Labs global threat intelligence and research team about the cyberthreat landscape for the next 12 months and beyond. FULL STORY >
Reshaping the Threat Landscape: Deepfake Cyberattacks
By Industry Contributor 15 November 2022Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa, provides some insight on how people make deepfake videos and the harm it can do. FULL STORY >
77% Of Global Retail Organisations have been hit by ransomware
By Staff Writer 15 November 2022While many people think that ransomware attacks are reserved for big businesses, small and medium-sized retailers are just as much at risk. Anna Collard dives deeper on the rerail sector and cyber-crime and how they can avoid it. FULL STORY >
Safeguard the new feeding ground - cyberattacks and Operation Technology
By Industry Contributor 11 November 2022Johan Potgieter at Schneider Electric explains how the widespread integration of embedded devices and OT networks with corporate or IT infrastructure has created a new feeding ground for hackers. FULL STORY >
4 steps to secure and access data in an anywhere operations world
By Staff Writer 11 November 2022With organisations continuing to blend virtual and physical experiences and a significant increase in cyber threats, four steps can help businesses increase their data security, privacy, and accessibility. FULL STORY >
Securing IoT devices to maximise their value
By Industry Contributor 9 November 2022By Amritesh Anand, Associate Vice President at In2IT Technologies FULL STORY >
Kaspersky launches new online cybersecurity training for ‘Mobile Malware Reverse Engineering’ experts
By Staff Writer 7 November 2022A newly announced Mobile Malware Reverse Engineering course helps upgrade any security team’s ability to counter various cyber threats caused for business by smartphones. FULL STORY >
Africa: Perfect for tourists - and cybercriminals…
By Staff Writer 1 November 2022Why has Africa become such a popular target for cybercriminals, and how can this threat be met and overcome? Anna Collard from KnowBe4 Africa answers this vexing question. FULL STORY >
5 Ransomware protection strategies for 2023
By Industry Contributor 31 October 2022If the growth of ransomware attacks in 2022 indicates what the future holds, security teams everywhere should expect to see this attack vector become even more popular in 2023.Fortinet's Aamir Lakhani explains. FULL STORY >
Cybersecurity - So many needles. One giant haystack.
By Staff Writer 26 October 2022Whichever way your alert flag blows, it’s exhausting sifting the real security alerts from the false positives. Nclose's Stephen Osler explains how to cope with the tsunami-level waves of information coming from different tools. FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?