Phish me tender, phish me true, these phish are all for you
By Staff Writer 19 April 2022Phishing remains the most successful threat action when it comes to data breaches, successful hacks and social engineering. Anna Collard from KnowBe4 Africa explains why, and what you can do. FULL STORY >
Freelancers, the gig economy and enforcing gig security
By Staff Writer 14 April 2022Anna Collard from KnowBe4 Africa speaks to how organisations can slip security into the freelance zeitgeist so company and gig workers alike are protected. FULL STORY >
From criminal enterprise to big business: The evolution of ransomware
By Staff Writer 14 April 2022Ransomware is reaching new, dangerous levels of sophistication, as today’s ransomware attack landscape has been wreaking havoc in large enterprises in South Africa and across the globe. Patrick Evans explains. FULL STORY >
Why it is critical to have a robust cyber security strategy in place
By Industry Contributor 12 April 2022By Charles Blackbeard, Business Development Manager, ABB Ability Digital Solutions FULL STORY >
The battle of AI & ML in the cybersecurity world
By Industry Contributor 12 April 2022Jack Chan, Vice President, Product Management at Fortinet unravels the role AI and machine learning are playing - and how to stay secure as these technologies continue to expand. FULL STORY >
The 5 most common security concerns in the emerging new Web 3.0 world
By Industry Contributor 12 April 2022Fady Younes, Cybersecurity Director for Cisco Middle East and Africa unpacks the metaverse, our new Web 3.0 world and the types of security considerations they are bringing into the picture for businesses globally. FULL STORY >
Cisco Talos reveals its top tips to stay safe on Web 3.0
By Staff Writer 11 April 2022As Web 3.0 continues to evolve our digital economy, Cisco offers some pointers for staying safe. FULL STORY >
IBM launches first quantum-safe system
By Staff Writer 8 April 2022IBM has announced the IBM z16 to provide real-time AI for transaction processing at scale and the industry’s first Quantum-Safe System. FULL STORY >
Lazarus distributes Trojanized DeFi app to steal cryptocurrency
By Staff Writer 4 April 2022The advanced and persistent actor, Lazarus – infamous for its growing financial motivations, has hit cryptocurrency businesses with new, Trojanized decentralized finance (DeFi) apps FULL STORY >
Quick, cheap and dangerous: how scammers are creating thousands of fake pages using phishing kits
By Staff Writer 1 April 2022Kaspersky researchers have revealed that in 2021 they blocked 1.2 million individual phishing pages based on 469 phishing kits — which are ready-made fake page templates, that allow... FULL STORY >
Zero Trust cybersecurity approach vital for besieged local businesses
By Industry Contributor 31 March 2022By Andre Lombaard, Technical Manager: Security at Datacentrix FULL STORY >
Data Management methodologies – an introduction into ABAC, FGAC and RBAC
By Industry Contributor 29 March 2022By Gary Allemann, Managing Director at Master Data Management FULL STORY >
The value of using a VPN
By Staff Writer 28 March 2022Kaspersky reveals the hidden capabilities of VPN services, with five unexpected scenarios where using a VPN proves its worth. FULL STORY >
Managing the risk inherent in cryptocurrency
By Staff Writer 28 March 2022Cryptocurrency may be moving from fringe to frontline finance, but that does not mean it is free from risk. Anna Collard, at KnowBe4 Africa, explains how to manage these risks. FULL STORY >
Password reset notification scam: a business trick that never gets old
By Staff Writer 24 March 2022Maria Garnaeva from Kaspersky unpacks the oldest trick in the book - the password reset notification scam - and details what companies and employees can do to avoid becoming a victim of it. FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?