0 comments

1337 Hack: inside the mind of the attacker

By Industry Contributor 26 October 2022

How do cybercriminals think when they enter into your organisation? What do they look for? And how can you use this insight to protect your business? Anna Collard offers some insight on hacking the hacker. FULL STORY >

0 comments

Trend Micro looks to close the skills gap with innovative training program.

By Staff Writer 26 October 2022

The current global cybersecurity skills shortage is putting businesses and individuals across the board at increased risk. As the threat landscape continues to expand, intervention is crucial. Trend Micro believes it... FULL STORY >

0 comments

Security versus functionality - avoiding end user revolt

By Industry Contributor 21 October 2022

By Wayne Olsen – Managing Executive Cybersecurity at BCX FULL STORY >

0 comments

Cybersecurity is foundational for an economic recovery that works for all

By Industry Contributor 19 October 2022

Mohammed Amin from Dell Technologies answers the pressing question on how we protect against cyber threats as we focus on global recovery, and a new era of economic growth. FULL STORY >

0 comments

Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter

By Industry Contributor 18 October 2022

Fortinet's Jim Richberg and Troy Ament explain why adopting a Zero Trust security model is more important than ever for organizations. FULL STORY >

0 comments

Kaspersky: African users hit by new malicious WhatsApp mod

By Staff Writer 14 October 2022

Kaspersky researchers discovered a new malicious version of a popular WhatsApp messenger mod dubbed YoWhatsApp. Popular for having features that the official app does not offer, this mod spreads the notorious Triada mobile Trojan, which... FULL STORY >

0 comments

Kaspersky and Centerm sign MoU to cooperate for creation of cyber immune endpoints

By Staff Writer 13 October 2022

Global cybersecurity solutions provider Kaspersky and Centerm, a worldwide leader in thin client solutions, hardware, and management software, recently signed a Memorandum of Understanding (MoU) to cooperate in... FULL STORY >

0 comments

The short answer to long passwords

By Staff Writer 12 October 2022

Gur Geva, Co-Founder and CEO of iiDENTIFii, explains why passwords are headed the same way as the dinosaurs, and why we will be safer without the need for them. FULL STORY >

0 comments

Cybersecurity in 2022 and Beyond - Exploring the Cybersecurity Poverty Line Part 2

By Ryan Noik 10 October 2022

Beyond the current attack trends and getting the basics right, as outlined in Part 1, there is also what Wendy Nather from Cisco calls the security poverty line, which she unpacked in greater detail. FULL STORY >

0 comments

Cybersecurity in 2022 and Beyond - Exploring the Cybersecurity Poverty Line Part 1

By Ryan Noik 7 October 2022

In a recent exclusive roundtable with Cisco, the Head of Advisory CISOs at Cisco, Wendy Nather, unpacked for us one of the major current attack vectors that cybercriminals are using, explained the security... FULL STORY >

0 comments

New NullMixer malware wreaking havoc

By Staff Writer 27 September 2022

New active campaign NullMixer hunts for users’ payment data, cryptocurrencies and social network accounts. FULL STORY >

0 comments

60% of Cybersecurity Professionals feel they’re losing ground against cybercriminals

By Staff Writer 27 September 2022

New approach needed in South Africa to empower Secops’ to detect, respond and remediate growing attacks in real-time, according to Trellix Research. FULL STORY >

0 comments

Cyber defence a critical component of an ESG strategy, says Kaspersky

By Staff Writer 22 September 2022

As cyberattacks on pipelines, water pumping stations and manufacturing plants hit the news, customers and investors grow more aware of the need for organisations to take responsibility for the protection of their potential... FULL STORY >

0 comments

Understanding cybersecurity in the post-Pandemic era

By Industry Contributor 22 September 2022

Prior to the Covid pandemic, employees would access data from within the office environment through a secure, centralised on-premises network. Ian Engelbrecht explains how this has changed - and what it means for companies. FULL STORY >

0 comments

Ransomware is a business resilience issue, not an IT problem

By Industry Contributor 16 September 2022

Although ransomware affects IT infrastructure, the impact of an attack goes far beyond and stretches to every corner of a business. Kate Mollet explains the implications of ransomware being on the rise and what to do about it. FULL STORY >

(Page 9 of 35) 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (22 votes)
Better business applications (132 votes)