0 comments

Interview with Trend Micro: Addressing gender under-representation in cybersecurity

By Ryan Noik 8 September 2022

Tarryn Maitland, Regional Account Manager at Trend Micro, addresses the issue of underrepresentation of women in technology. Ryan Noik chats to her about what is impeding its progress and what Trend Micro... FULL STORY >

0 comments

Chilling Netflix docuseries an important reminder to strengthen passwords

By Staff Writer 29 August 2022

The Most Hated Man on the Internet shows viewers just how quickly personal data can be hacked, stolen, and exploited. FULL STORY >

0 comments

AI & ML to your defence in an evolving cyber threat landscape

By Industry Contributor 26 August 2022

Nowadays, threat actors are leaning on new tools and techniques to improve the efficiency of their attacks. Only artificial intelligence (AI) and machine learning move quickly enough to defend organisations in this evolving cyber... FULL STORY >

0 comments

Tech trends: What the rest of 2022 has in store for the industry

By Staff Writer 24 August 2022

Since the beginning of 2022, several trends have emerged as newsworthy front-runners. CTO Wayne Yan and architect Saša Slankamenac at South African specialised software development firm Dariel, take a closer look at Web3,... FULL STORY >

0 comments

AI and ML reliability and security: BlenderBot and other cases

By Staff Writer 23 August 2022

Kaspersky unpacks BlenderBot, chatbots and what they reveal about the reliability of machine learning and AI. FULL STORY >

0 comments

The security impact of digital innovation

By Industry Contributor 19 August 2022

Nclose's Stephen Osler unpacks how the rise in internet users, cybersecurity incidents and the role of the pandemic on digital transformation are creating a perfect storm of change - and how businesses can respond. FULL STORY >

0 comments

Remote Desktop Protocol attacks constitute 75% of company access sold on the Darknet

By Staff Writer 16 August 2022

Selling access to corporate infrastructure is one of the most popular topics on Darknet forums currently, accounting for 12% of all messages in trade forum sections analysed. FULL STORY >

0 comments

Hybrid work security: A zero trust model to protect the future workplace

By Staff Writer 16 August 2022

Though remote work and the hybrid working model have proven beneficial for employee well-being, inclusion and productivity, there have also been pitfalls – most notably on the security front. FULL STORY >

0 comments

Apple’s new Lockdown mode: What it tells us about the mobile security landscape

By Staff Writer 15 August 2022

The development and release of Apple’s new Lockdown Mode feature stresses the importance of mobile security and raises some interesting questions about the state of cybersecurity. FULL STORY >

0 comments

Cyber-Wellness Means Cyber-Aware

By Staff Writer 4 August 2022

Tired? Stressed? Distracted? The overwhelm of 2022 is affecting how people respond to cybersecurity threats. FULL STORY >

0 comments

On the road again? Here’s how to stay cyber safe

By Industry Contributor 2 August 2022

Doros Hadjizenonos, Regional Director Southern Africa, Fortinet addresses how to stay cybersafe as travel opens up again. FULL STORY >

0 comments

Phishing and scams expanding significantly this year

By Staff Writer 2 August 2022

Phishing and scams have hit the roof with a 234% increase in the number of detections in Africa in Q2 2022, according to Kaspersky. FULL STORY >

0 comments

Newly released ESET Threat Report details how war in Ukraine has changed the threat landscape

By Industry Contributor 30 July 2022

By Roman Kováč, Chief Research Officer at ESET FULL STORY >

0 comments

IBM Report: South African Data Breach Costs Reach All-Time High

By Staff Writer 29 July 2022

According to a recent IBM report, organisations lagging in zero trust adoption suffered higher losses while millions of Rands were saved through leveraging security AI and analytics. FULL STORY >

0 comments

New malicious campaign hunts Discord messenger users via infected open-source packages

By Staff Writer 29 July 2022

On July 26, using the internal automated system for monitoring open-source repositories, Kaspersky researchers identified a malicious campaign dubbed LofyLife. FULL STORY >

(Page 12 of 66) 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (21 votes)
Better business applications (132 votes)