1337 Hack: inside the mind of the attacker
By Industry Contributor 26 October 2022How do cybercriminals think when they enter into your organisation? What do they look for? And how can you use this insight to protect your business? Anna Collard offers some insight on hacking the hacker. FULL STORY >
Trend Micro looks to close the skills gap with innovative training program.
By Staff Writer 26 October 2022The current global cybersecurity skills shortage is putting businesses and individuals across the board at increased risk. As the threat landscape continues to expand, intervention is crucial. Trend Micro believes it... FULL STORY >
Security versus functionality - avoiding end user revolt
By Industry Contributor 21 October 2022By Wayne Olsen – Managing Executive Cybersecurity at BCX FULL STORY >
Cybersecurity is foundational for an economic recovery that works for all
By Industry Contributor 19 October 2022Mohammed Amin from Dell Technologies answers the pressing question on how we protect against cyber threats as we focus on global recovery, and a new era of economic growth. FULL STORY >
Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter
By Industry Contributor 18 October 2022Fortinet's Jim Richberg and Troy Ament explain why adopting a Zero Trust security model is more important than ever for organizations. FULL STORY >
Kaspersky: African users hit by new malicious WhatsApp mod
By Staff Writer 14 October 2022Kaspersky researchers discovered a new malicious version of a popular WhatsApp messenger mod dubbed YoWhatsApp. Popular for having features that the official app does not offer, this mod spreads the notorious Triada mobile Trojan, which... FULL STORY >
Kaspersky and Centerm sign MoU to cooperate for creation of cyber immune endpoints
By Staff Writer 13 October 2022Global cybersecurity solutions provider Kaspersky and Centerm, a worldwide leader in thin client solutions, hardware, and management software, recently signed a Memorandum of Understanding (MoU) to cooperate in... FULL STORY >
The short answer to long passwords
By Staff Writer 12 October 2022Gur Geva, Co-Founder and CEO of iiDENTIFii, explains why passwords are headed the same way as the dinosaurs, and why we will be safer without the need for them. FULL STORY >
Cybersecurity in 2022 and Beyond - Exploring the Cybersecurity Poverty Line Part 2
By Ryan Noik 10 October 2022Beyond the current attack trends and getting the basics right, as outlined in Part 1, there is also what Wendy Nather from Cisco calls the security poverty line, which she unpacked in greater detail. FULL STORY >
Cybersecurity in 2022 and Beyond - Exploring the Cybersecurity Poverty Line Part 1
By Ryan Noik 7 October 2022In a recent exclusive roundtable with Cisco, the Head of Advisory CISOs at Cisco, Wendy Nather, unpacked for us one of the major current attack vectors that cybercriminals are using, explained the security... FULL STORY >
New NullMixer malware wreaking havoc
By Staff Writer 27 September 2022New active campaign NullMixer hunts for users’ payment data, cryptocurrencies and social network accounts. FULL STORY >
60% of Cybersecurity Professionals feel they’re losing ground against cybercriminals
By Staff Writer 27 September 2022New approach needed in South Africa to empower Secops’ to detect, respond and remediate growing attacks in real-time, according to Trellix Research. FULL STORY >
Cyber defence a critical component of an ESG strategy, says Kaspersky
By Staff Writer 22 September 2022As cyberattacks on pipelines, water pumping stations and manufacturing plants hit the news, customers and investors grow more aware of the need for organisations to take responsibility for the protection of their potential... FULL STORY >
Understanding cybersecurity in the post-Pandemic era
By Industry Contributor 22 September 2022Prior to the Covid pandemic, employees would access data from within the office environment through a secure, centralised on-premises network. Ian Engelbrecht explains how this has changed - and what it means for companies. FULL STORY >
Ransomware is a business resilience issue, not an IT problem
By Industry Contributor 16 September 2022Although ransomware affects IT infrastructure, the impact of an attack goes far beyond and stretches to every corner of a business. Kate Mollet explains the implications of ransomware being on the rise and what to do about it. FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?