0 comments

Reshaping the Threat Landscape: Deepfake Cyberattacks

By Industry Contributor 15 November 2022

Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa, provides some insight on how people make deepfake videos and the harm it can do. FULL STORY >

0 comments

77% Of Global Retail Organisations have been hit by ransomware

By Staff Writer 15 November 2022

While many people think that ransomware attacks are reserved for big businesses, small and medium-sized retailers are just as much at risk. Anna Collard dives deeper on the rerail sector and cyber-crime and how they can avoid it. FULL STORY >

0 comments

Bringing high-tech to the high seas

By Industry Contributor 14 November 2022

Marcel Bruyns at Axis Communications explains why South Africa’s upgraded ports will need a high-tech security strategy. FULL STORY >

0 comments

4 steps to secure and access data in an anywhere operations world

By Staff Writer 11 November 2022

With organisations continuing to blend virtual and physical experiences and a significant increase in cyber threats, four steps can help businesses increase their data security, privacy, and accessibility. FULL STORY >

0 comments

Securing IoT devices to maximise their value

By Industry Contributor 9 November 2022

By Amritesh Anand, Associate Vice President at In2IT Technologies FULL STORY >

0 comments

Kaspersky launches new online cybersecurity training for ‘Mobile Malware Reverse Engineering’ experts

By Staff Writer 7 November 2022

A newly announced Mobile Malware Reverse Engineering course helps upgrade any security team’s ability to counter various cyber threats caused for business by smartphones. FULL STORY >

0 comments

Sustainable and efficient manufacturing key to our future food security

By Industry Contributor 1 November 2022

Mark Wilson from SYSPRO unpacks the complexities of food security in South Africa, and the critical role manufacturing has to play. FULL STORY >

0 comments

Africa: Perfect for tourists - and cybercriminals…

By Staff Writer 1 November 2022

Why has Africa become such a popular target for cybercriminals, and how can this threat be met and overcome? Anna Collard from KnowBe4 Africa answers this vexing question. FULL STORY >

0 comments

5 Ransomware protection strategies for 2023

By Industry Contributor 31 October 2022

If the growth of ransomware attacks in 2022 indicates what the future holds, security teams everywhere should expect to see this attack vector become even more popular in 2023.Fortinet's Aamir Lakhani explains. FULL STORY >

0 comments

Cybersecurity - So many needles. One giant haystack.

By Staff Writer 26 October 2022

Whichever way your alert flag blows, it’s exhausting sifting the real security alerts from the false positives. Nclose's Stephen Osler explains how to cope with the tsunami-level waves of information coming from different tools. FULL STORY >

0 comments

1337 Hack: inside the mind of the attacker

By Industry Contributor 26 October 2022

How do cybercriminals think when they enter into your organisation? What do they look for? And how can you use this insight to protect your business? Anna Collard offers some insight on hacking the hacker. FULL STORY >

0 comments

Trend Micro looks to close the skills gap with innovative training program.

By Staff Writer 26 October 2022

The current global cybersecurity skills shortage is putting businesses and individuals across the board at increased risk. As the threat landscape continues to expand, intervention is crucial. Trend Micro believes it... FULL STORY >

0 comments

Security versus functionality - avoiding end user revolt

By Industry Contributor 21 October 2022

By Wayne Olsen – Managing Executive Cybersecurity at BCX FULL STORY >

0 comments

Cybersecurity is foundational for an economic recovery that works for all

By Industry Contributor 19 October 2022

Mohammed Amin from Dell Technologies answers the pressing question on how we protect against cyber threats as we focus on global recovery, and a new era of economic growth. FULL STORY >

0 comments

Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter

By Industry Contributor 18 October 2022

Fortinet's Jim Richberg and Troy Ament explain why adopting a Zero Trust security model is more important than ever for organizations. FULL STORY >

(Page 10 of 66) 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (21 votes)
Better business applications (132 votes)